美姬社区

Notice

Please be advised you are about to leave the 美姬社区 website to proceed to the AustLII website. Click OK to proceed.

Critical and Emerging Technologies

ICT Procurement Standards

These are the key standards that, when conformed to, can support sellers to meet common technical specifications in ICT procurement requirements.

Privacy

provides guidance for implementing and maintaining a Privacy Information Management System (PIMS)- a framework for processing and controlling Personally Identifiable Information (PII)
Benefits: allows an organisation to adapt to, and report on, varied international privacy requirements, protect customer data and report to stakeholders.
Certification: first party (self-declaration), second party or third party (external).

Risk Management

provides principles, a framework and a process for managing risk. It can be used by any organization regardless of its size, activity or sector.

Benefits: can help organisations increase the likelihood of achieving objectives, improve the identification of opportunities and threats and effectively allocate and use resources for risk treatment.
Certification: first party (self-declaration), second party or third party (external). 聽

Cybersecurity Automation and Control Systems

series addresses cybersecurity for operational technology in automation and control systems.鈥
Benefits: prevent key cybersecurity risks- ransom, fines, increased insurance premiums, reputational damage or security breaches, with an average cost of $1 million per breach.
Certification: first party (self-declaration), second party or third party (external). 聽

Cloud Security

gives guidelines for information security controls applicable to the provision and use of cloud services for cloud service providers and customers.鈥
Benefits: build trust in your organisation, create competititve advantage , ensure interoperability and secure cloud data.
Certification:
first party (self-declaration), second party or third party (external).

Cybersecurity

gives guidelines for information security controls applicable to the provision and use of cloud services for cloud service providers and customers.

Benefits: build trust in your organisation, create competititve advantage , ensure interoperability and secure cloud data.
Certification:
first party (self-declaration), second party or third party (external).

For further enquiries, please contact SI@standards.org.au