ISO 30302 Information and documentation - Management systems for records - Guidelines for implementation - First Edition
Список продуктов
Данный раздел/документ содержится в продуктах:
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- 35
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- 35.040
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- ISO ISO/IEC TR 27019 Information technology - Security techniques - Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry - First Edition
- DIN SPEC 27009 Guidance for information security management of power supply control systems based on ISO/IEC 27002
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- Картотека зарубежных и международных стандартов
Ссылается на
- В списке элементов: 18
- ISO ISO/IEC 27001 CORR 2 Information technology - Security techniques - Information security management systems - Requirements TECHNICAL CORRIGENDUM 2 - Second EditionИнформационные технологии - методы безопасности - системы управления Информационной безопасностью - требования TECHNICAL CORRIGENDUM 2 - Второй Выпуск
Карточка документа - ISO 9000 Quality Management Systems - Fundamentals and Vocabulary - Fourth editionСистемы управления качеством - Основные принципы и Словарь - Четвертое издание
На основе ISO 9000 разработан ГОСТ Р ИСО 9000-2015 (IDT)ГОСТ Р ИСО 9000-2015 (IDT) - ISO 14001 Environmental management systems — Requirements with guidance for use - Third editionСистемы экологического управления — Требования с руководством использованием - Третий выпуск
На основе ISO 14001 разработан ГОСТ Р ИСО 14001-2016 (IDT)ГОСТ Р ИСО 14001-2016 (IDT) - ISO TR 18128 Information and documentation - Risk assessment for records processes and systems - First EditionИнформация и документация - оценка степени риска для процессов и систем записей - Первый Выпуск
Карточка документа - ISO 13008 Information and documentation - Digital records conversion and migration process - First EditionИнформация и документация - Цифровое преобразование записей и процесс миграции - Первый Выпуск
На основе ISO 13008 разработан ГОСТ Р ИСО 13008-2015 (IDT)ГОСТ Р ИСО 13008-2015 (IDT) - SN NS-ISO/IEC 31010:2009 Risk management - Risk assessment techniquesУправление рисками - методы Оценки риска
Карточка документа - ISO 19011 Guidelines for auditing management systems - Second EditionИнструкции для аудита систем управления - Второй Выпуск
На основе ISO 19011 разработан ГОСТ Р ИСО 19011-2012 (IDT)ГОСТ Р ИСО 19011-2012 (IDT) - ISO 30301 Information and documentation — Management systems for records — Requirements - First EditionИнформация и документация — Системы управления для записей — Требований - Первый Выпуск
На основе ISO 30301 разработан ГОСТ Р ИСО 30301-2014 (IDT)ГОСТ Р ИСО 30301-2014 (IDT) - ISO 30300 Information and documentation — Management systems for records — Fundamentals and vocabulary - First EditionИнформация и документация — Системы управления для записей — Основных принципов и словаря - Первый Выпуск
На основе ISO 30300 разработан ГОСТ Р ИСО 30300-2015 (IDT)ГОСТ Р ИСО 30300-2015 (IDT) - ISO 16175-2 Information and documentation — Principles and functional requirements for records in electronic office environments — Part 2: Guidelines and functional requirements for digital records management systems - First EditionИнформация и документация — Принципы и функциональные требования для записей в электронных офисных средах — Часть 2: Инструкции и функциональные требования для цифровых систем управления записями - Первый Выпуск
Карточка документа - ISO 16175-3 Information and documentation — Principles and functional requirements for records in electronic office environments — Part 3: Guidelines and functional requirements for records in business systems - First EditionИнформация и документация — Принципы и функциональные требования для записей в электронных офисных средах — Часть 3: Инструкции и функциональные требования для записей в бизнес-системах - Первый Выпуск
Карточка документа - ISO 16175-1 Information and documentation - Principles and functional requirements for records in electronic office environments - Part 1: Overview and statement of principles - First EditionИнформация и документация — Принципы и функциональные требования для записей в электронных офисных средах — Часть 1: Обзор и заявление принципов - Первый Выпуск
Карточка документа - ISO TR 13028 Information and documentation — Implementation guidelines for digitization of records - First EditionИнформация и документация — инструкции по Внедрению для оцифровки записей - Первый Выпуск
Карточка документа - ISO 23081-2 Information and documentation — Managing metadata for records — Part 2: Conceptual and implementation issues - First EditionИнформация и документация — Управляющие метаданные для записей — Часть 2: Концептуальный и проблемы внедрения - Первый Выпуск
Карточка документа - ISO TR 26122 CORR 1 Information and documentation — Work process analysis for records TECHNICAL CORRIGENDUM 1 - First EditionИнформация и документация — анализ процесса Работы для TECHNICAL CORRIGENDUM 1 записей - Первый Выпуск
Карточка документа - ISO 28000 Specification for security management systems for the supply chain - First EditionСпецификация для систем управления безопасностью для системы поставок - Первый Выпуск
Карточка документа - ISO 15489-1 Information and Documentation - Records Management - Part 1: General - First EditionИнформация и документация - записывают управление - часть 1: общий - первый выпуск
На основе ISO 15489-1 разработан ГОСТ Р ИСО 15489-1-2007 (IDT)ГОСТ Р ИСО 15489-1-2007 (IDT) - ISO TR 15489-2 Information and Documentation - Records Management - Part 2: Guidelines - First EditionИнформация и документация - записывают управление - часть 2: инструкции - первый выпуск
Карточка документа



