BH GSO ISO/IEC 27038:2017

Bahraini Standard   Current Edition
· Approved on 03 April 2017 ·

Information technology -- Security techniques -- Specification for digital redaction

Information coding
Including coding of audio, picture, multimedia and hypermedia information, bar coding, etc.

BH GSO ISO/IEC 27038:2017 Files

BH GSO ISO/IEC 27038:2017 Scope

ISO/IEC 27038:2014 specifies characteristics of techniques for performing digital redaction on digital documents. It also specifies requirements for software redaction tools and methods of testing that digital redaction has been securely completed. ISO/IEC 27038:2014 does not include the redaction of information from databas

Best Sellers From Information Sector

GSO ISO/TR 18492:2017
ISO/TR 18492:2005 
Gulf Standard
Long-term preservation of electronic document-based information
BH GSO ISO 16175-2:2016
GSO ISO 16175-2:2013 
Bahraini Standard
Information and documentation -- Principles and functional requirements for records in electronic office environments -- Part 2: Guidelines and functional requirements for digital records management systems
GSO ISO 16175-2:2013
ISO 16175-2:2011 
Gulf Standard
Information and documentation -- Principles and functional requirements for records in electronic office environments -- Part 2: Guidelines and functional requirements for digital records management systems
GSO ISO/TR 13028:2013
ISO/TR 13028:2010 
Gulf Standard
Information and documentation - Implementation guidelines for digitization of records

Recently Published from Information Sector

GSO ISO/TS 23635:2024
ISO/TS 23635:2022 
Gulf Standard
Blockchain and distributed ledger technologies — Guidelines for governance
GSO ISO/IEC TR 3445:2024
ISO/IEC TR 3445:2022 
Gulf Standard
Information technology — Cloud computing — Audit of cloud services
GSO ISO/IEC 30162:2024
ISO/IEC 30162:2022 
Gulf Standard
Internet of Things (IoT) — Compatibility requirements and model for devices within industrial IoT systems
GSO ISO/IEC 30107-3:2024
ISO/IEC 30107-3:2023 
Gulf Standard
Information technology — Biometric presentation attack detection — Part 3: Testing and reporting