Filter :
Standard and/or project under the direct responsibility of ISO/TC 292 Secretariat | Stage | ICS |
---|---|---|
Performance criteria for authentication solutions used to combat counterfeiting of material goods |
95.99 | |
Guidelines for interoperable object identification and related authentication systems to deter counterfeiting and illicit trade |
95.99 | |
Management system for private security operations — Requirements with guidance for use |
90.93 | |
Societal security — Terminology |
95.99 | |
Security and resilience — Vocabulary |
95.99 | |
Security and resilience — Vocabulary |
90.92 | |
Security and resilience — Vocabulary |
20.20 |
|
Societal security — Business continuity management systems — Requirements |
95.99 | |
Security and resilience — Business continuity management systems — Requirements |
60.60 | |
Societal security — Video-surveillance — Export interoperability |
90.93 | |
Societal security — Technological capabilities |
95.99 | |
Societal security — Business continuity management systems — Guidance |
95.99 | |
Security and resilience — Business continuity management systems — Guidance on the use of ISO 22301 |
60.60 | |
Societal security — Mass evacuation — Guidelines for planning |
90.93 | |
Security and resilience — Organizational resilience — Principles and attributes |
90.92 | |
Security and resilience — Organizational resilience — Principles and attributes |
10.99 |
|
Societal security — Business continuity management systems — Guidelines for business impact analysis (BIA) |
95.99 | |
Security and resilience — Business continuity management systems — Guidelines for business impact analysis |
60.60 | |
Societal security — Business continuity management systems — Guidelines for supply chain continuity |
95.99 | |
Security and resilience — Business continuity management systems — Guidelines for supply chain continuity management |
60.60 | |
Security and resilience — Community resilience — Guidelines for planning the involvement of spontaneous volunteers |
90.93 | |
Societal security — Emergency management — Requirements for incident response |
95.99 | |
Security and resilience — Emergency management — Guidelines for incident management |
60.60 | |
Societal security — Emergency management — Guidelines for public warning |
95.99 | |
Security and resilience — Emergency management — Guidelines for public warning |
60.60 | |
Societal security — Emergency management — Guidelines for colour-coded alerts |
95.99 | |
Security and resilience – Emergency management – Guidelines for colour-coded alert |
60.60 | |
Security and resilience — Emergency management — Guidelines for capability assessment |
90.93 | |
Security and resilience — Emergency management — Guidelines for monitoring facilities with identified hazards |
60.60 | |
Security and resilience — Emergency management — Guidelines for implementation of a community-based landslide early warning system |
90.92 | |
Security and resilience — Emergency management — Part 1: General guidelines for the implementation of a community-based disaster early warning system |
60.60 | |
Security and resilience — Emergency management — Part 2: Guidelines for the implementation of a community-based early warning system for landslides |
40.60 | |
Security and resilience — Emergency management — Part 3: Guidelines for the implementation of a community-based early warning system for tsunamis |
60.60 | |
Security and resilience — Emergency management — Guidelines for the use of social media in emergencies |
60.60 | |
Security and resilience — Business continuity management systems — Guidelines for people aspects of business continuity |
90.93 | |
Security and resilience — Business continuity management systems — Guidelines for business continuity strategy |
90.93 | |
Security and resilience — Business continuity management systems — Guidelines for developing business continuity plans and procedures |
60.60 | |
Security and resilience — Organizational resilience — Guidelines for resilience policy and strategy |
30.60 | |
Security and resilience — Protective security — Guidelines for an enterprise protective security architecture and framework |
40.00 | |
Security and resilience — Protective security — Guidelines for an enterprise protective security architecture and framework |
40.98 | |
Security and resilience — Protective security — Guidelines for crime prevention through environmental design |
60.60 | |
Security and resilience — Protective security — Guidelines for the development of a security plan for an organization |
60.60 | |
Security and resilience — Vehicle security barriers — Part 1: Performance requirement, vehicle impact test method and performance rating |
50.20 | |
Security and resilience — Vehicle security barriers — Part 2: Application |
50.20 | |
Security and resilience — Protective security — Guidelines for crime prevention through environmental design for residential facilities |
30.60 | |
Security and resilience — Emergency management — Overview and framework |
30.98 | |
Societal security — Emergency management — Message structure for exchange of information |
60.60 | |
Security and resilience — Guidelines for crowd management |
10.99 |
|
Security and resilience — Guidelines for hardened protective shelters |
40.00 | |
Security and resilience — Crisis management — Concept, principles and framework |
20.60 |
|
Security and resilience — Crisis management — Guidelines |
60.60 | |
Security and resilience — Community resilience — Framework and principles for energy resilience |
20.00 |
|
Security and resilience — Urban resilience — Framework and principles |
60.60 | |
Security and resilience — Community resilience — Principles and framework for urban resilience |
30.98 | |
Security and resilience — Community resilience — Guidelines for resilient infrastructure |
20.60 |
|
Security and resilience — Authenticity, integrity and trust for products and documents — Framework for establishing trustworthy supply chains |
20.20 |
|
Security and resilience — Guidelines for complexity assessment process |
90.93 | |
Security and resilience — Authenticity, integrity and trust for products and documents — Specification and usage of visible digital seal (VDS) data format for authentication, verification and acquisition of data carried by a document or object |
50.20 | |
Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines for interoperable object identification and related authentication systems to deter counterfeiting and illicit trade |
60.60 | |
Security and resilience — Guidelines for hosting and organizing citywide or regional events |
60.60 | |
Security and resilience — Authenticity, integrity and trust for products and documents — General principles for product fraud risk and countermeasures |
60.60 | |
Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines for establishing interoperability among object identification systems to deter counterfeiting and illicit trade |
60.60 | |
Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines for the content, security, issuance and examination of excise tax stamps |
60.60 | |
Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines for the selection and performance evaluation of authentication solutions for material goods |
60.60 | |
Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines to establish and monitor a protection plan and its implementation |
60.60 | |
Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines to establish a framework for trust and interoperability |
60.60 | |
Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines for brand protection and enforcement procedures |
30.60 | |
Security and resilience — Authenticity, integrity and trust for products and documents — Validation procedures for the application of artefact metrics |
60.60 | |
Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines for securing physical documents |
40.60 | |
Security and resilience — Community resilience — Guidelines for conducting peer reviews |
60.60 | |
Security and resilience — Community resilience — Guidelines for planning recovery and renewal |
60.60 | |
Security and resilience — Community resilience — Guidelines for planning recovery and renewal |
95.99 | |
Security and resilience — Community resilience — Guidelines for supporting vulnerable persons in an emergency |
60.60 | |
Security and resilience — Community resilience — Guidelines for information exchange between organizations |
60.60 | |
Societal security — Guidelines for establishing partnering arrangements |
90.93 | |
Societal security — Guidelines for exercises |
90.93 | |
Security and resilience – Emergency management - Guidelines for exercises |
30.98 | |
Specification for security management systems for the supply chain |
95.99 | |
Security and resilience — Security management systems — Requirements |
60.60 | |
Security management systems for the supply chain — Best practices for implementing supply chain security, assessments and plans — Requirements and guidance |
90.93 | |
Security management systems for the supply chain — Development of resilience in the supply chain — Requirements with guidance for use |
90.60 | |
Security management systems for the supply chain — Requirements for bodies providing audit and certification of supply chain security management systems |
90.60 | |
Security management systems for the supply chain — Guidelines for the implementation of ISO 28000 — Part 1: General principles |
90.60 | |
Security management systems for the supply chain — Guidelines for the implementation of ISO 28000 — Part 3: Additional specific guidance for adopting ISO 28000 for use by medium and small businesses (other than marine ports) |
90.60 | |
Security management systems for the supply chain — Guidelines for the implementation of ISO 28000 — Part 4: Additional specific guidance on implementing ISO 28000 if compliance with ISO 28001 is a management objective |
90.60 | |
Security management systems for the supply chain — Guidelines for the implementation of ISO 28000 — Part 1: General principles — Technical Corrigendum 1 |
60.60 |
No matching records found. Please try changing the filter settings.