Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard
Information technology — Big data security and privacy — Guidelines for managing big data risks
20.00 New project registered in TC/SC work programme
Information technology — Big data security and privacy — Implementation guidelines
00.00 Proposal for new project received
Cybersecurity — Artificial Intelligence — Guidance for addressing security threats and failures in artificial intelligence systems
30.60 Close of voting/ comment period
Cybersecurity and Privacy — Artificial Intelligence — Privacy protection
20.60 Close of comment period
Information technology — Security techniques — Cybersecurity and ISO and IEC Standards
30.99 CD approved for registration as DIS
Cybersecurity education and training
20.00 New project registered in TC/SC work programme
Cybersecurity evaluation of complex systems — Introduction and framework overview
20.60 Close of comment period
Support for customized or multipurpose evaluation
00.00 Proposal for new project received
Cybersecurity — IoT security and privacy — Cybersecurity labelling framework for consumer IoT
30.99 CD approved for registration as DIS
Information security, cybersecurity and privacy protection — Security and privacy requirements for authentication using biometrics on mobile devices — Part 2: Remote modes
40.60 Close of voting
Information technology — Security techniques — Privacy guidelines for fintech services
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
Privacy protection - Guidance on the use of models for privacy engineering
20.00 New project registered in TC/SC work programme
Information security, cybersecurity and privacy protection — Guidelines on privacy preservation based on zero knowledge proofs
30.99 CD approved for registration as DIS
Information technology, cybersecurity and privacy protection — Age assurance systems — Part 1: Framework
30.60 Close of voting/ comment period
Information technology, cybersecurity and privacy protection — Age assurance systems — Part 2: Technical approaches and guidance for implementation
10.60 Close of voting
Age assurance systems — Part 2: Interoperability, technical architecture and guidelines for use
00.00 Proposal for new project received
Information technology, cybersecurity and privacy protection — Age assurance systems — Part 3: Benchmarks for benchmarking analysis
20.60 Close of comment period