Information technology — Destruction of data carriers — Part 1: Principles and definitions

This standard defines terms and principles for the destruction of data carriers.

Technologies de l'information — Destruction de véhicules de données — Partie 1: Principes et concepts

General Information

Status
Published
Publication Date
29-Jul-2018
Current Stage
9060 - Close of review
Start Date
04-Mar-2029
Ref Project

Buy Standard

Standard
ISO/IEC 21964-1:2018 - Information technology -- Destruction of data carriers
English language
6 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

INTERNATIONAL ISO/IEC
STANDARD 21964-1
First edition
2018-08
Information technology — Destruction
of data carriers —
Part 1:
Principles and definitions
Technologies de l'information — Destruction de véhicules de
données —
Partie 1: Principes et concepts
Reference number
ISO/IEC 21964-1:2018(E)
©
ISO/IEC 2018

---------------------- Page: 1 ----------------------
ISO/IEC 21964-1:2018(E)

COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2018
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Fax: +41 22 749 09 47
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2018 – All rights reserved

---------------------- Page: 2 ----------------------
ISO/IEC 21964-1:2018(E)

Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Terms and definitions . 1
3 Identifying the protection requirement and assigning the protection class .2
4 Security levels for data carriers . 3
5 Assignment of protection classes and security levels . 4
5.1 Selection of security level . 4
5.2 Altering the security level. 4
5.2.1 General. 4
5.2.2 Responsibility . 5
5.2.3 Requirements . 5
Bibliography . 6
© ISO/IEC 2018 – All rights reserved iii

---------------------- Page: 3 ----------------------
ISO/IEC 21964-1:2018(E)

Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work. In the field of information technology, ISO and IEC have established a joint technical committee,
ISO/IEC JTC 1.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the
different types of document should be noted (see www .iso .org/directives).
Attention is drawn to the possibility that
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.