Infoteenus
Uued standardid
This document does not establish
— architectures of biometric comparison using an ICC,
— on-card biometric comparison, both in sensor-off-card systems and as part of biometric system-on-card,
— security policies for on-card biometric comparison,
— requirements for off-card biometric comparison,
— requirements for biometric system-on-card (defined in the ISO/IEC 17839 series), or
— modality-specific requirements for storage and comparison.
— terms and definitions that are useful in the specification and use of quality measures;
— purpose and interpretation of biometric quality scores;
— motivation for developing biometric sample datasets for the purpose of quality score normalization;
— format for exchange of quality assessment algorithm results;
— methods for aggregation of quality scores;
— methods for evaluating the efficiency of quality assessment algorithms.
The following are outside the scope of this document:
— specification of minimum requirements for sample, module, or system quality scores;
— standardization of quality assessment algorithms;
— assessment of utility of biometric samples or references for human examiners.
This document:
— defines the composition of a structured clinical sequencing report (see Clause 6);
— defines the required data fields and their metadata for a structured clinical sequencing report (see Clause 7);
— defines the optional data (see Clause 8);
— covers the DNA-level variation from human samples using whole genome sequencing, whole exome sequencing, and targeted sequencing (disease-targeted gene panels) by next-generation sequencing technologies (though whole transcriptome sequencing and other technologies are important to provide better patient care and enable precision medicine, this document only deals with DNA-level changes);
— covers mainly clinical applications and clinical research such as clinical trials and translational research which uses clinical data (basic research and other scientific areas are outside the scope of this document);
— does not cover the other biological species, i.e. genomes of viruses and microbes;
— does not cover the Sanger sequencing methods.
This document describes the SIRI Control Action service, one of a modular set of services for the exchange of Real-time information. The Control Action service (SIRI-CA) is concerned with the exchange of information about decision made concerning the real-time management of the operation of a transport system as performed by operators while operating the services.
This European Passenger Information Accessibility Profile (EPIAP) for NeTEx is for exchanging passenger information; it describes how to extend EPIP (the European Passenger Information Profile) with additional information (including a minimal set) to feed the necessary accessibility passenger information services in a European wide and multimodal context. EPIAP especially formulates a mandatory minimal implementation that needs to be filled in by everybody to deliver the necessary information for an assessment of the accessibility of site(s), vehicles and on vehicle-site interaction for impaired persons. The minimal level allows an assessment and contains the information to produce PRM TSI if necessary. It will also cover what the current legislation usually warrants. It then describes how additional information must be provided if an organisation decides to provide it (e.g. the information of the full DELFI+ standard in Germany).
EPIP does not reflect part 5 (New Modes) yet. However, EPIAP takes it into account. EPIP will have to be adapted accordingly.
For EPIAP to be of use, the EC needs to declare the minimal level of EPIAP as mandatory.
This document provides guidance on the usage of the core parts of the ISO/IEC 30105 series: ISO/IEC 30105-1, ISO/IEC 30105-2 and ISO/IEC 30105-3.
This document also introduces the extended parts of the ISO/IEC 30105 series: ISO/IEC TS 30105-6, ISO/IEC TR 30105-7, ISO/IEC 30105-8 and ISO/IEC TS 30105-9.
This document is intended to be used in concurrence with the other parts of the ISO/IEC 30105 series and the assessment approach provided by ISO/IEC 33002 for assessing processes.
A PAM consists of a set of indicators for process performance and process capability. The indicators are used as a basis for collecting the objective evidence that enables an assessor to determine ratings. The set of indicators included in this document is not intended to be an all-inclusive set, nor is it intended to be applicable in its entirety. Supersets and subsets are selected according to the context and the scope of the assessment.
The PAM in this document is directed at assessment sponsors and competent assessors who wish to select a model and an associated documented assessment process for the ITES-BPO lifecycle processes, for process capability gap determination.
— overview of internet healthcare service network;
— infrastructure and deployment scheme of internet healthcare service network;
— security of internet healthcare service network.
This document mainly focuses on the engineering architecture and infrastructure deployment of healthcare information transmission among various healthcare organizations through services, as shown in Figure 1. The implementation of information systems and healthcare services within organizations is demonstrated in Annex A.
This document applies to the construction and application of internet healthcare service network.
This document establishes
— architectures of biometric comparison using an ICC,
— on-card biometric comparison, both in sensor-off-card systems and as part of biometric system-on-card, and
— security policies for on-card biometric comparison.
This document does not establish
— requirements for off-card biometric comparison,
— requirements for biometric system-on-card (defined in the ISO/IEC 17839 series),
— work-sharing on-card biometric comparison (defined in ISO/IEC 24787-2), or
— modality-specific requirements for storage and comparison.
This part of the IEC 61784 3 series explains some common principles that can be used in the transmission of safety-relevant messages among participants within a distributed network which use fieldbus technology in accordance with the requirements of IEC 61508 (all parts) for functional safety. These principles are based on the black channel approach. They can be used in various industrial applications such as process control, manufacturing automation and machinery.
This part and the IEC 61784-3-x parts specify several functional safety communication profiles based on the communication profiles and protocol layers of the fieldbus technologies in IEC 61784-1, IEC 61784-2 and IEC 61158 (all parts). These functional safety communication profiles use the black channel approach, as defined in IEC 61508. These functional safety communication profiles are intended for implementation in safety devices exclusively.
NOTE 1 Other safety-related communication systems meeting the requirements of IEC 61508 (all parts) can exist that are not included in IEC 61784-3 (all parts).
NOTE 2 It does not cover electrical safety and intrinsic safety aspects. Electrical safety relates to hazards such as electrical shock. Intrinsic safety relates to hazards associated with potentially explosive atmospheres.
All systems are exposed to unauthorized access at some point of their life cycle. Additional measures need to be considered in any safety-related application to protect fieldbus systems against unauthorized access. IEC 62443 (all parts) will address many of these issues; the relationship with IEC 62443 (all parts) is detailed in a dedicated subclause of this document.
NOTE 3 Implementation of a functional safety communication profile according to this document in a device is not sufficient to qualify it as a safety device, as defined in IEC 61508 (all parts).
NOTE 4 The resulting SIL claim of a system depends on the implementation of the selected functional safety communication profile within this system.
NOTE 5 Annex C explains the numbering scheme used for the technology-specific parts (IEC 61784-3-x) as well as their common general structure.
NOTE 6 Annex D provides a guideline for the assessment and test of safety communication profiles as well as safety-related devices using these profiles.
This document specifies the process reference model (PRM). It contains process definitions across the lifecycle described in terms of process context, purpose and outcomes, together with a framework defining relationships between the processes.
The process purpose details the high-level objective of performing the process such that implementation of the process leads to tangible benefits for stakeholders. The process outcomes are clearly defined by observable results and aligned to the business benefits derived by the customer and service provider.
This document:
— covers IT enabled business processes that are outsourced;
— is not intended to address IT processes, but includes references to them at key touchpoints for completeness;
— is applicable to the service provider, not to the customer;
— is applicable to all lifecycle processes of ITES-BPO;
— serves as a PRM for organizations providing ITES-BPO services.
— digital rights management (DRM) free protection, i.e. technologies which do not rely on content encryption but rather use content fingerprinting or watermarking, adequate for use cases where user convenience is the top priority;
— user key-based DRM protection, adequate where user constraints are limited;
— device key-based DRM protection, adequate where the transfer of publications from one device to another is severely constrained.
Asendatud standardid
- terms and definitions that are useful in the specification and use of quality metrics;
- purpose and interpretation of biometric quality scores;
- encoding of quality data fields in biometric data interchange formats;
- methods for developing biometric sample datasets for the purpose of quality score normalisation;
- format for exchange of quality algorithm results;
- methods for aggregation of quality scores.
The following are outside the scope of ISO/IEC 29794-1:2016:
- specification of minimum requirements for sample, module, or system quality scores;
- performance assessment of quality algorithms;
- standardization of quality algorithms.
- covers IT-enabled business processes that are outsourced;
- is not intended to address IT processes but includes references to them at key touchpoints for completeness;
- is applicable to the service provider, not to the customer;
- is applicable to all lifecycle processes of ITES-BPO;
- serves as a process reference model for organizations providing ITES-BPO services.
- covers IT enabled business processes that are outsourced;
- is not intended to cover IT services but includes similar, relevant process for completeness;
- is applicable to the service provider, not to the customer;
- is applicable to all lifecycle processes of ITES-BPO;
- serves as a process assessment model for organizations providing ITES-BPO services that:
- conforms to the requirements of ISO/IEC 33004;
- supports the performance assessment by providing indicators for the interpretation of the process purposes and outcomes, as defined in ISO/IEC 24774, and the process attributes, as defined in ISO/IEC 33020.
A process assessment model consists of a set of indicators for process performance and process capability. The indicators are used as a basis for collecting the objective evidence that enables an assessor to determine ratings. The set of indicators included in this document is not intended to be an all-inclusive set nor is it intended to be applicable in its entirety. Supersets and subsets that are appropriate to the context and scope of the assessment should be selected.
The process assessment model in this document is directed at assessment sponsors and competent assessors who wish to select a model, and associated documented assessment process, for the ITES-BPO lifecycle processes, for risk determination or process improvement.
- covers IT enabled business processes that are outsourced;
- is not intended to cover IT services but includes similar, relevant process for completeness;
- is applicable to the service provider, not to the customer;
- is applicable to all lifecycle processes of ITES-BPO;
- serves as a measurement framework for processes and provide an organization maturity model for organizations providing ITES-BPO services that:
- conforms to the requirements of ISO/IEC 33003 and ISO/IEC 33004;
- supports the performance assessment by providing a framework to measure and derive capability and organization maturity levels.
ISO/TS 20428:2017
- defines the composition of a structured clinical sequencing report (see Clause 5),
- defines the required data fields and their metadata for a structured clinical sequencing report (see Clause 6),
- defines the optional data (see Clause 7),
- covers the DNA-level variation from human samples using whole genome sequencing, whole exome sequencing, and targeted sequencing (disease-targeted gene panels) by next generation sequencing technologies. Though whole transcriptome sequencing and other technologies are important to provide better patient care and enable precision medicine, this document only deals with DNA-level changes,
- covers mainly clinical applications and clinical research such as clinical trials and translational research which uses clinical data. However, the necessary steps such as de-identification or consent from patient should be applied. The basic research and other scientific areas are outside the scope of this document,
- does not cover the other biological species, i.e. genomes of viruses and microbes, and
- does not cover the Sanger sequencing methods.
- covers IT enabled business processes that are outsourced;
- is not intended to cover IT services but includes similar, relevant process for completeness;
- is applicable to the service provider, not to the customer;
- is applicable to all lifecycle processes of ITES-BPO;
- provides guidance on application of the process assessment model, how to strategically leverage the assessment and to use it in the context of an improvement programme or risk assessment for an ITES-BPO service provider organization.
- DRM free protection, i.e. technologies which does not rely on content encryption but rather use content fingerprinting or watermarking, adequate for use cases where user convenience is the top priority;
- user key-based DRM protection, adequate where user constraints are limited;
- device key-based DRM protection, adequate where the transfer of publications from one device to another is severely constrained.