{"id":347269,"date":"2024-10-20T00:25:21","date_gmt":"2024-10-20T00:25:21","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-21964-12018\/"},"modified":"2024-10-25T23:55:16","modified_gmt":"2024-10-25T23:55:16","slug":"bs-iso-iec-21964-12018","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-21964-12018\/","title":{"rendered":"BS ISO\/IEC 21964-1:2018"},"content":{"rendered":"
This standard defines terms and principles for the destruction of data carriers.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3 Identifying the protection requirement and assigning the protection class <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Security levels for data carriers <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5 Assignment of protection classes and security levels 5.1 Selection of security level 5.2 Altering the security level 5.2.1 General <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.2.2 Responsibility 5.2.3 Requirements <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Destruction of data carriers – Principles and definitions<\/b><\/p>\n |