THE CURRENT VERSION OF THE STANDARD ČSN ISO/IEC 27001:2014
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F63468352%3A_____%2F15%3A%230000410" target="_blank" >RIV/63468352:_____/15:#0000410 - isvavai.cz</a>
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
THE CURRENT VERSION OF THE STANDARD ČSN ISO/IEC 27001:2014
Popis výsledku v původním jazyce
In September 2014 was published the Czech version of the update this standard (also the criterion standard norm). According to this standard certification, audits of the information security management system(ISMS) are performed. If an organization logs on to respect and follow this standard, then it assumes an obligation to establish, implement, maintain and continually improve that system. The standard norm then remains committed to complying with the basic requirements regarding information security: the privacy, integrity and availability of information assets that are in the scope of the ISMS organization. The ISMS must protect their key critical data which are necessary for successful operation. An organization must avoid any infringements of the legitimate, statutory, regulatory and contractual obligations which are related to the safety information and all other safety requirements. From this it is clear that an organization must protect their data in any form throughout their life cycle, regardless of their current carrier whether digital form, voice, paper or other means of communication, etc.)
Název v anglickém jazyce
THE CURRENT VERSION OF THE STANDARD ČSN ISO/IEC 27001:2014
Popis výsledku anglicky
In September 2014 was published the Czech version of the update this standard (also the criterion standard norm). According to this standard certification, audits of the information security management system(ISMS) are performed. If an organization logs on to respect and follow this standard, then it assumes an obligation to establish, implement, maintain and continually improve that system. The standard norm then remains committed to complying with the basic requirements regarding information security: the privacy, integrity and availability of information assets that are in the scope of the ISMS organization. The ISMS must protect their key critical data which are necessary for successful operation. An organization must avoid any infringements of the legitimate, statutory, regulatory and contractual obligations which are related to the safety information and all other safety requirements. From this it is clear that an organization must protect their data in any form throughout their life cycle, regardless of their current carrier whether digital form, voice, paper or other means of communication, etc.)
Klasifikace
Druh
J<sub>x</sub> - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
CEP obor
AH - Ekonomie
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
N - Vyzkumna aktivita podporovana z neverejnych zdroju
Ostatní
Rok uplatnění
2015
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název periodika
INTERNATIONAL CONFERENCE ON SOFT COMPUTING APPLIED IN COMPUTER AND ECONOMIC ENVIRONMENTS
ISSN
2336-6141
e-ISSN
—
Svazek periodika
1
Číslo periodika v rámci svazku
1
Stát vydavatele periodika
CZ - Česká republika
Počet stran výsledku
7
Strana od-do
67-73
Kód UT WoS článku
—
EID výsledku v databázi Scopus
—