Location: Home > IEC standards
IEC standards
  • 7.1.2 ESI landscape ISO/IEC 27050-1:2019, Clause 7, provides useful information on the common types of ESI, common sources of ESI, ESI representations and non-ESI as part of the electronic discovery process. This information, when combined with the matter specific requirements, can serve as a useful starting point in identifying potential sources of relevant ESI. These sources can include business units, people, ICT systems and hardcopy. Identification should be as thorough and comprehensive as possible. The scope of ESI potentially subject to preservation and disclosure can be uncertain in the early phases of a matter. The nature of the matter itself...
    11-29
  • 3.4 life cycle evolution of a system (3.11), product, service, project, or other human-made entity from conception through retirement [SOURCE: ISO/IEC/IEEE 15288:2015, 4.1.23] 3.5 downstream handling processes (3.7 ) and movements of products and services that occur after an entity in the supply chain (3.10) takes custody of the products and responsibility for services [SOURCE: ISO 28001:2007, 3.10, modified — The word “goods” was replaced by “products and services”, and the definition was changed to better reflect this change in focus.] 3.6 outsourcing acquisition (3.2) of services (with or without products) in support of a business function for performing activities...
    11-29
  • 4.2 ISO/IEC 27001 concepts ISO/IEC 27001 provides a model for establishing, implementing, maintaining and continually improving an information security management system (ISMS) to protect information. Information can take any form, be stored in any way and be used for any purpose by, or within, the organization. To achieve conformity with the requirements specified in ISO/IEC 27001, an organization should implement an ISMS based on a risk assessment process. As part of a risk treatment process, the organization should select, implement, monitor and review a variety of measures to manage identified risks. These measures are known as information security controls. The...
    11-29
  • 3 Terms and definitions For the purposes of this document, the terms and definitions given in ISO/IEC/IEEE 12207, ISO/IEC/IEEE 15288, and the following apply. ISO and IEC maintain terminological databases for use in standardization at the following addresses: — ISO Online browsing platform: available at https://www.iso .org/obp — IEC Electropedia: available at http://www.electropedia .org/ NOTE 1 For additional terms and definitions in the field of systems and software engineering, see ISO/IEC/IEEE 24765, which is published periodically as a “snapshot ” of the SEVOCAB (Systems and software engineering – Vocabulary) database and is publicly accessible at www.computer.org/sevocab. NOTE 2 Because feature-based...
    11-29
  • 4 Test parameters and conditions 4.1 Copying device setup Place the copying device on a horizontal surface and set up the copying device according to the manufacturer’s recommendations. The copying device shall be fully enclosed in its normal exterior cover. All image and copying modes should be at their factory preset configuration for the copying device. It is assumed that the settings listed in Table 1 are common to all copying devices. These listed settings shall be set to the manufacturer’s default or preset condition for the device. If a device has settings not listed in Table 1, they too...
    11-29
  • All image and print quality modifiers shall be at their factory preset configuration for the printer and default-installed condition for the driver. If auto media detection is available on the printer, it shall be disabled and media-type set to plain paper. This is to avoid inaccurate sensing of the media. If the printer and driver settings differ, then the driver defaults shall be used. Any user selectable ink conservation modes, (e.g. draft) shall be disabled during testing. For printers that default to duplex printing, the default shall be overridden and the printer shall be set to simplex for yield testing....
    11-29
  • 3.1.1 application platform platform composed of target IT equipment (3.1.4), operating systems, and middleware (3.1.3) with the purpose of providing an IT service (3.1.5) Note 1 to entry: An application platform is an environment for executing software applications ( 3.1.2) such as ERP and CRM software. Therefore, a software application itself is not included as part of an application platform. 3.1.2 software application computer program for implementing an IT service (3.1.5 ) Note 1 to entry: A software application is usually developed independently for each IT service. 3.1.3 middleware software layer between an operating system and the software applications (3.1.2)...
    11-29
  • 3.2 user individual or organization that needs parts manufactured by AM technology and would like to turn to an AMSP for service 3.3 designer individual or organization that performs 3D modelling and 3D scanning assigned by agreement between user and AMSP 3.4 infrastructure as a service IaaS cloud service category in which the cloud capabilities type provided to the cloud service user is an infrastructure capabilities type [SOURCE: ISO/IEC 17788:2014 3.2.24, modified — term “cloud service customer” replaced with “cloud service user”.] 3.5 software as a service SaaS cloud service category in which the cloud capabilities type provided to the...
    11-29
  • 7 Specification of OLF classes 7.1 Definition of a resource class A resource class is a subset of OLF information that can be identified with explicit boundaries and meaning and whose properties and behaviour follow the same rules. In this document, the metadata for OLF consists of a hierarchy of resource classes. 7.2 Attributes of a resource class The class specification attributes shall be as specified in the MLR format according to ISO/IEC 19788-1:2011, Clause 8/Amd 1:2014. 7.3 Resource class specification: Matrix template This document uses a matrix template defined in MLR according to ISO/IEC 19788-1:2011, Clause 8/ Amd 1:2014....
    11-29
  • 3.4 knowledge human or organizational asset enabling effective decisions and action in context Note 1 to entry: Knowledge can be individual, collective or organizational. Note 2 to entry: There are diverse views on the scope covered within knowledge, based on context and purpose. The definition above is general as to the various perspectives. Examples of knowledge include insights and know-how. Note 3 to entry: Knowledge is acquired through learning or experience. [SOURCE: ISO 30401:2018, 3.25] 3.5 knowledge cloud collection of learning cell (3.7 ) and knowledge cluster ( 3.6 ) aggregated semantically based on several related or similar topics to...
    11-29