Shopping Cart

No products in the cart.

BSI PD ISO/TR 15801:2017

$198.66

Document management. Electronically stored information. Recommendations for trustworthiness and reliability

Published By Publication Date Number of Pages
BSI 2017 54
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This document describes the implementation and operation of information management systems that store and make available for use electronically stored information (ESI) in a trustworthy and reliable manner. Such ESI can be of any type, including “page based” information, information in databases and audio/video information.

This document is for use by any organization that uses systems to store trustworthy ESI over time. Such systems incorporate policies, procedures, technology and audit requirements that ensure that trustworthiness of the ESI is maintained.

This document does not cover processes used to evaluate whether ESI can be considered to be trustworthy prior to it being stored or imported into the system. However, it can be used to demonstrate that, once the electronic information is stored, output from the system will be a true and accurate reproduction of the ESI created and/or imported.

PDF Catalog

PDF Pages PDF Title
2 National foreword
8 Foreword
9 Introduction
10 1 Scope
2 Normative references
3 Terms and definitions
11 4 Information management policy
4.1 General
4.2 Information management policy document
4.2.1 Contents
12 4.2.2 ESI covered
4.2.3 ESI roles and responsibilities
4.2.4 ESI security classification
13 4.2.5 Storage media
4.2.6 Data file formats and compression
4.2.7 Outsourcing
4.2.8 Standards related to information management
14 4.2.9 Retention and disposal schedules
4.2.10 Information management responsibilities
4.2.11 Compliance with policy
5 Duty of care
5.1 General
5.1.1 Trusted system
5.1.2 Controls
15 5.1.3 Segregation of roles
5.2 Information security management
5.2.1 Information security policy
16 5.2.2 Risk assessment
17 5.2.3 Information security framework
5.3 Business continuity planning
5.4 Consultations
18 6 Procedures and processes
6.1 General
6.2 Procedures manual
6.2.1 Documentation
6.2.2 Content
19 6.2.3 Compliance with procedures
6.2.4 Updating and reviews
6.3 ESI capture
6.3.1 General
20 6.3.2 Creation and importing
6.3.3 Information loss
21 6.3.4 Metadata
6.4 Document image capture
6.4.1 General
6.4.2 Preparation of paper documents
22 6.4.3 Document batching
6.4.4 Photocopying
23 6.4.5 Scanning processes
24 6.4.6 Quality control
26 6.4.7 Rescanning
6.4.8 Image processing
6.5 Data capture
6.5.1 Data creation
27 6.5.2 Conversion and migration
6.6 Database considerations
6.6.1 General
6.6.2 Database systems
29 6.6.3 Database schemas
6.6.4 Master data management
30 6.6.5 Transactional vs. updating
6.7 Indexing
6.7.1 General
6.7.2 Manual indexing
6.7.3 Automatic indexing
6.7.4 Index storage
31 6.7.5 Index amendments
6.7.6 Index accuracy
6.8 Authenticated output procedures
32 6.9 ESI transmission
6.9.1 Intra-system ESI transfer
6.9.2 External transmission of files
33 6.10 Information retention
34 6.11 Information preservation
6.12 Information destruction
6.13 Backup and system recovery
35 6.14 System maintenance
6.14.1 General
6.14.2 Scanning systems
36 6.15 Security and protection
6.15.1 Security procedures
6.15.2 Encryption keys
37 6.16 Use of contracted services
6.16.1 General
6.16.2 Procedural considerations
38 6.16.3 Transportation of paper documents
6.16.4 Use of trusted third party
6.17 Workflow
39 6.18 Date and time stamps
6.19 Version control
6.19.1 Information
6.19.2 Documentation
40 6.19.3 Procedures and processes
6.20 Maintenance of documentation
7 Enabling technologies
7.1 General
41 7.2 System description manual
7.3 Storage media and sub-system considerations
42 7.4 Access levels
7.5 System integrity checks
7.5.1 General
43 7.5.2 Digital and electronic signatures (including biometric signatures)
7.6 Image processing
44 7.7 Compression techniques
45 7.8 Form overlays and form removal
7.9 Environmental considerations
7.10 Migration
46 7.11 Information deletion and/or expungement
8 Audit trails
8.1 General
8.1.1 Audit trail data
47 8.1.2 Creation
8.1.3 Date and time
8.1.4 Storage
48 8.1.5 Access
8.1.6 Security and protection
8.2 System
8.2.1 General
49 8.2.2 Audit trail information
8.2.3 Migration and conversion
8.3 ESI
8.3.1 General
8.3.2 ESI capture
50 8.3.3 Batch information
51 8.3.4 Indexing
8.3.5 Change control
8.3.6 Digital signatures
52 8.3.7 Destruction of information
8.3.8 Workflow
53 Bibliography
BSI PD ISO/TR 15801:2017
$198.66