{"id":346905,"date":"2024-10-20T00:23:27","date_gmt":"2024-10-20T00:23:27","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-188292017\/"},"modified":"2024-10-25T23:51:50","modified_gmt":"2024-10-25T23:51:50","slug":"bs-iso-188292017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-188292017\/","title":{"rendered":"BS ISO 18829:2017"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Trustworthy ECM system assessment 4.1 General 4.1.1 Assessment output <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.1.2 Process review <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4.1.3 Fulfilling legal, government and regulatory requirements 4.2 Assessment activities 4.2.1 Review of existing business practice and other organizational documentation 4.2.2 Evaluating information ingested into the system <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4.2.3 Readability <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4.3 Evaluating information retention, preservation and destruction 4.3.1 Application interoperability 4.3.2 Data migration between electronic storage media 4.3.3 Data format conversion 4.3.4 Media monitoring program 4.3.5 Data expunging\/deletion 4.4 System security 4.4.1 Security-related information to be collected\/reviewed <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4.4.2 Securing the information to prevent unauthorized modification or deletion of ESI 4.5 Evaluating information access 4.5.1 General <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4.5.2 Managing authorized modification 4.6 Evaluating history and audit trail information 4.6.1 General 4.6.2 Retrieval of previous document version required to be maintained <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 4.6.3 Management of notes and annotations as part of a business record 4.6.4 Management of ESI containing macros and\/or external links <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 4.7 Evaluating technical and data storage environments 4.7.1 Information security models 4.7.2 Storage technologies assessment 4.7.3 Technology standards being followed by organization 4.7.4 Primary and secondary storage <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Document management. Assessing ECM\/EDRM implementations. Trustworthiness<\/b><\/p>\n |