Subcomité Título de subcomité Normas publicadas Normas en desarrollo
ISO/TC 292/SC 1 Emergency management 10 1
Filtrar :
Norma o proyecto bajo la responsabilidad directa de ISO/TC 292 Secretaría Etapa ICS
Performance criteria for authentication solutions used to combat counterfeiting of material goods
95.99
Guidelines for interoperable object identification and related authentication systems to deter counterfeiting and illicit trade
95.99
Management system for private security operations — Requirements with guidance for use
90.93
Management system for private security operations — Requirements with guidance for use — Amendment 1: Climate action changes
60.60
Societal security — Terminology
95.99
Security and resilience — Vocabulary
95.99
Security and resilience — Vocabulary
90.92
Security and resilience — Vocabulary
30.60
Societal security — Business continuity management systems — Requirements
95.99
Security and resilience — Business continuity management systems — Requirements
60.60
Security and resilience — Business continuity management systems — Requirements — Amendment 1: Climate action changes
60.60
Societal security — Video-surveillance — Export interoperability
90.93
Societal security — Technological capabilities
95.99
Societal security — Business continuity management systems — Guidance
95.99
Security and resilience — Business continuity management systems — Guidance on the use of ISO 22301
60.60
Societal security — Mass evacuation — Guidelines for planning
90.93
Security and resilience — Organizational resilience — Principles and attributes
90.92
Security and resilience — Organizational resilience — Principles and attributes
10.99
Societal security — Business continuity management systems — Guidelines for business impact analysis (BIA)
95.99
Security and resilience — Business continuity management systems — Guidelines for business impact analysis
60.60
Societal security — Business continuity management systems — Guidelines for supply chain continuity
95.99
Security and resilience — Business continuity management systems — Guidelines for supply chain continuity management
60.60
Security and resilience — Community resilience — Guidelines for planning the involvement of spontaneous volunteers
90.93
Societal security — Emergency management — Requirements for incident response
95.99
Societal security — Emergency management — Guidelines for public warning
95.99
Societal security — Emergency management — Guidelines for colour-coded alerts
95.99
Security and resilience — Business continuity management systems — Guidelines for people aspects of business continuity
90.93
Security and resilience — Business continuity management systems — Guidelines for business continuity strategy
90.93
Security and resilience — Business continuity management systems — Guidelines for developing business continuity plans and procedures
90.20
Security and resilience — Organizational resilience — Guidelines for resilience policy and strategy
50.00
Security and resilience — Protective security — Guidelines for an enterprise protective security architecture and framework
50.00
Security and resilience — Protective security — Guidelines for crime prevention through environmental design
60.60
Security and resilience — Protective security — Guidelines for the development of a security plan for an organization
60.60
Security and resilience — Vehicle security barriers — Part 1: Performance requirement, vehicle impact test method and performance rating
60.60
Security and resilience — Vehicle security barriers — Part 2: Application
60.60
Security and resilience — Vehicle security barriers — Part 3: Access control planning requirements in connection with the deployment of tested vehicle security barriers
10.99
Security and resilience — Protective security — Guidelines for crime prevention through environmental design for residential facilities
40.20
Security and resilience — Guidelines for crowd management
10.99
Security and resilience — Guidelines for hardened protective shelters
50.20
Security and resilience — Crisis management — Concepts, principles and framework
50.60
Security and resilience — Crisis management — Guidelines
60.60
Security and resilience — Community resilience — Framework and principles for energy resilience
30.60
Security and resilience — Urban resilience — Framework and principles
60.60
Security and resilience — Community resilience — Principles and framework for urban resilience
40.60
Security and resilience — Community resilience — Guidelines for resilient infrastructure
30.60
Security and resilience — Authenticity, integrity and trust for products and documents — Framework for establishing trustworthy supply chains
30.60
Security and resilience — Guidelines for complexity assessment process
90.93
Security and resilience — Authenticity, integrity and trust for products and documents — Specification and usage of visible digital seal (VDS) data format for authentication, verification and acquisition of data carried by a document or object
60.60
Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines for interoperable object identification and related authentication systems to deter counterfeiting and illicit trade
60.60
Security and resilience — Guidelines for hosting and organizing citywide or regional events
60.60
Security and resilience — Authenticity, integrity and trust for products and documents — General principles for product fraud risk and countermeasures
90.93
Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines for establishing interoperability among object identification systems to deter counterfeiting and illicit trade
90.93
Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines for the content, security, issuance and examination of excise tax stamps
90.60
Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines for the selection and performance evaluation of authentication solutions for material goods
60.60
Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines to establish and monitor a protection plan and its implementation
60.60
Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines to establish a framework for trust and interoperability
60.60
Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines for brand protection and enforcement procedures
50.20
Security and resilience — Authenticity, integrity and trust for products and documents — Validation procedures for the application of artefact metrics
60.60
Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines for securing physical documents
60.60
Security and resilience — Community resilience — Guidelines for conducting peer reviews
60.60
Security and resilience — Community resilience — Guidelines for planning recovery and renewal
60.60
Security and resilience — Community resilience — Guidelines for planning recovery and renewal
95.99
Security and resilience — Community resilience — Guidelines for supporting vulnerable persons in an emergency
90.93
Security and resilience — Community resilience — Guidelines for information exchange between organizations
60.60
Societal security — Guidelines for establishing partnering arrangements
90.93
Societal security — Guidelines for exercises
90.93
Specification for security management systems for the supply chain
95.99
Security and resilience — Security management systems — Requirements
60.60
Security and resilience — Security management systems — Requirements — Amendment 1: Climate action changes
60.60
Security management systems for the supply chain — Best practices for implementing supply chain security, assessments and plans — Requirements and guidance
90.93
Security management systems for the supply chain — Development of resilience in the supply chain — Requirements with guidance for use
95.60
Security management systems for the supply chain — Requirements for bodies providing audit and certification of supply chain security management systems
90.60
Security management systems for the supply chain — Guidelines for the implementation of ISO 28000 — Part 1: General principles
90.60
Security management systems for the supply chain — Guidelines for the implementation of ISO 28000 — Part 3: Additional specific guidance for adopting ISO 28000 for use by medium and small businesses (other than marine ports)
90.20
Security management systems for the supply chain — Guidelines for the implementation of ISO 28000 — Part 4: Additional specific guidance on implementing ISO 28000 if compliance with ISO 28001 is a management objective
90.20
Security management systems for the supply chain — Guidelines for the implementation of ISO 28000 — Part 1: General principles — Technical Corrigendum 1
60.60
Security and resilience — Security management systems — Guidelines for the application and implementation of ISO 28000 in the supply chain
20.20
Security and resilience ― Security management ― Guidelines on security management system (SMS) processes
20.00

No se ha encontrado ningún registro que coincida. Pruebe a cambiar los ajustes de filtro.