DCAF – Geneva Centre for Security Sector Governance

Acronym: DCAF

Established: 2000

Address: Maison de la Paix, Chemin Eugène-Rigot 2D, 1211 Geneva, Switzerland

Website: https://www.dcaf.ch/

DCAF is dedicated to improving the security of states and their people within a framework of democratic governance, the rule of law, respect for human rights, and gender equality. Since its founding in 2000, DCAF has contributed to making peace and development more sustainable by assisting partner states, and international actors supporting these states, to improve the governance of their security sector through inclusive and participatory reforms. It creates innovative knowledge products, promotes norms and good practices, provides legal and policy advice and supports capacity‐building of both state and non‐state security sector stakeholders.

Digital activities

Cyberspace and cybersecurity have numerous implications for security provision, management, and oversight, which is why DCAF is engaged in these topics within its work. DCAF has implemented a cycle of policy projects to develop new norms and good practices in cyberspace. At the operational level, cybersecurity governance has become a prominent part of SSR programming.

Digital policy issues

Cybersecurity

Digitalisation and cybersecurity are the challenges of today and tomorrow. They have an overarching impact on the security sector and the role of the security sector and governance reform (SSG/R) in the digital space. In our recent study SSG/R in the digital space: projections into the future policy, we shed light on the complex intersection of digitalisation and security sector governance. It examines how security sector actors have adapted to the digital transition and the emergence of new actors within the security ecosystem. It also provides concrete recommendations on how to navigate the complexities of digital technologies and shape ethical technology use and robust digital governance frameworks.

Capacity development

For newcomers to the field, DCAF offers the introductory series SSR Backgrounders, with a special issue on the impact of digitalisation on good governance in the security sector. It is a first-stop resource to understand the challenges and considerations for best policy and practice. 

DCAF implements projects that focus on improving cybersecurity laws and policies, increasing the capacity of cybersecurity actors, and strengthening accountability in cybersecurity. One of our priorities is to strengthen the individual and institutional capacities of national Computer Emergency Response Teams (CERTs). These teams are responsible for effectively and efficiently preventing and responding to attacks on national systems.

We also run the annual Young Faces research and mentoring programme, which helps to develop the next generation of cybersecurity experts in the Western Balkans. Each year, we select around 30 dynamic, forward-thinking young professionals to join the programme that enhances their knowledge of emerging trends in cybersecurity governance.

Research shows that women, girls, and LGBTQ+ people are the most affected by cybersecurity risks. Our publication and podcast series analyses how they have been pushed out of cyberspaces by abuse and discrimination, and what solutions exist to take a human-centred approach that considers everyone’s needs in cybersecurity.

In our Donors’ Talk podcast series, we spoke with DCAF’s Justice Advisor to draw on her 15 years of experience in justice sector reform to look at success stories, challenges, and what needs to be considered when supporting digitalisation projects related to justice reform. In Morocco, DCAF supported the National AntiCorruption Commission with training on the prevention and investigation of cyber-corruption and financial cybercrimes. The government commission digitalised its internal processes, resulting in more effective tracking and response to citizens’ data protection requests

Digital tools

Legislation databases 

DCAF’s three legal databases gather policies, laws, and decrees governing the security sectors in the Occupied Palestinian Territory, Libya, and Tunisia. Each database covers the main providers of security and justice, the formal supervision and management institutions, and the legislative and regulatory texts covering and authorising the work of informal control actors (political parties, media, NGOs, etc.). 

A resource for legislators, the justice system, academia, and civil society, the databases offer both a current resource and a historical perspective on the evolution of security sector legislation in the respective countries.

Handbook on effective use of social media in cybersecurity awareness-raising campaigns

This handbook provides condensed and easy-to-follow guidance and examples for designing content strategies and the efficient use of social media towards effective public awareness raising on cybersecurity. It shares the do’s and don’ts of social media, and how to have a strategic social media presence to support better cybersecurity.

For more tools and resources on cybersecurity governance and the security sector, visit our website

Social media channels

Facebook @DCAFgeneva

LinkedIn @DCAF

Spotify @dcaf

X @DCAF_Geneva

YouTube @DCAF Geneva Centre for Security Sector Governance

[Diplo] Policy Meets Tech #3: Cryptography

Event description

Event date: 24 January 2024, 13:00–16:00 CET

The third event in the ‘Policy meets tech’ series will be dedicated to cryptography. It will focus on unpacking cryptographic technology and discussing its policy implications.

The series is organised by Diplo, with the support of the US Permanent Mission to the UN in Geneva, and is dedicated to permanent missions in Geneva. This programme features a series of informative sessions for diplomats in Geneva, with the primary goals of demystifying the intricate realm of digital technologies, comprehending their capabilities and limitations, and delving into their policy implications in a manner that is both practical and pertinent for diplomats. From the intricacies of internet protocols to the intricacies of quantum computing, from cryptography to algorithms, these discussions will provide in-depth insights into the technical underpinnings of these technologies, their real-world applications, and the policy opportunities and challenges they present.

The event is only open to permanent missions in Geneva. For details, please contact Ms Sorina Teleanu, Director of Knoweldge, at geneva@diplomacy.edu.

ICT 4 Peace Foundation

[Talk] Cyber operations, armed conflicts, and international law

Event recording

Event description

Event date: 23 June 2022, 17:30–18:30 CEST

In this talk, researchers from the Geneva Academy will shed light on the different examples of cyber operations (e.g. Stuxnet, NotPetya, and SolarWinds) allegedly conducted or sponsored by states to explicate their geopolitical effects and challenges to international law. As the importance of ICT grows in the modern world, cyber operations have become an integral part of state and non-state actors’ strategies against other states and actors. Researchers will present their findings as part of the project on disruptive military technologies.

For more information, and to register, please visit the official page.

[Workshop] Boost your cyber skills: a cybersecurity event for Nonprofit Organizations

Event description

Event date: 22 June 2022, 9:30–15:00 CEST

The International Geneva Welcome Centre (CAGI) and the CyberPeace Institute jointly curated an all-day cyber skills event for NGOs. The uptake of cloud-based technologies and storage of valuable donor and beneficiary data have made NGOs a frequent target of cyberattacks. The reality for NGOs is that they have to safeguard their cybersecurity as much as private businesses do. The event invites local government representatives, cybersecurity experts, and NGOs to partake in testimonial drafting, roundtable discussions, and awareness raising for boosting NGOs’ cyber skills.

For more information, and to register, please visit the official page.

International Electrotechnical Commission

Acronym: IEC

Established: 1906

Address: 3 rue de Varembé, 1211 Geneva 20 , Switzerland

Website: https://www.iec.ch/

Stakeholder group: International and regional organisations

The IEC is the world leader in preparing international standards for all electrical, electronic, and related technologies. A global, not-for-profit membership organisation, the IEC provides a neutral and independent institutional framework to over 170 countries, coordinating the work of more than 20,000 experts. We administer four IEC Conformity Assessment Systems, representing the largest working multilateral agreement based on the one-time testing of products globally. The members of each system certify that devices, systems, installations, services, and people perform as required.

IEC International Standards represent a global consensus of state-of-the-art know-how and expertise. Together with conformity assessment, they are foundational for international trade.

IEC Standards incorporate the needs of many stakeholders in every participating country and form the basis for testing and certification. Every member country and all its stakeholders represented through the IEC National Committees has one vote and a say in what goes into an IEC International Standard.

Our work is used to verify the safety, performance, and interoperability of electric and electronic devices and systems such as mobile phones, refrigerators, office and medical equipment, or electricity generation. It also helps accelerate digitisation, artificial intelligence (AI), or virtual reality applications, protects information technology (IT) and critical infrastructure systems from cyberattacks and increases the safety of people and the environment.

Digital activities 

The IEC works to ensure that its activities have a global reach in order to meet all the challenges of digital transformation worldwide. The organisation covers an array of digital policy issues.

Digital policy issues

Artificial intelligence and the internet of things

AI applications are driving digital transformation across diverse industries, including energy, healthcare, smart manufacturing, transport, and other strategic sectors that rely on IEC Standards and Conformity Assessment Systems. AI technologies allow insights and analytics that go far beyond the capabilities of legacy analytic systems.

For example, the digital transformation of the grid enables increased automation, making it more efficient and able to integrate fluctuating renewable energy sources seamlessly. IEC Standards pave the way for the use of a variety of digital technologies relating to intelligent energy. They deal with issues such as integrating renewable energies within the electrical network but also increased automatisation.

The IEC’s work in the area of AI takes a three-pronged approach. IEC experts focus on sector-specific needs (vertical standards) and conformity assessment, while the joint IEC and International Organization for Standardization (ISO) technical committee on AI, JTC1/SC 42, brings together technology experts, as well as ethicists, lawyers, social scientists, and others to develop generic and foundational standards (horizontal standards).

In addition, IEC Safety Standards are an essential element of the framework for AI applications in power utilities and smart manufacturing. IEC Conformity Assessment Systems complete the process by ensuring the standards are properly implemented.

SC 42 addresses some concerns about the use and application of AI technologies. For example, data quality standards for ML and analytics are crucial for helping to ensure that applied technologies produce useful insights and eliminate faulty features.

Governance standards in AI and the business process framework for big data analytics address how the technologies can be governed and overseen from a management perspective. International standards in the areas of trustworthiness, ethics, and societal concerns will ensure responsible deployment.

The joint IEC and ISO technical committee also develop foundational standards for the IoT. Among other things, SC 41 standards promote interoperability, as well as architecture and a common vocabulary for the IoT.

Hardware

The IEC develops standards for many of the technologies that support digital transformation. Sensors, cloud, and edge computing are examples.

Advances in data acquisition systems are driving the growth of big data and AI use cases. The IEC prepares standards relating to semiconductor devices, including sensors.

Sensors can be certified under the IEC Quality Assessment System for Electronic Components (IECQ), one of the four IEC Conformity Assessment Systems.

Cloud computing and its technologies have also supported the increase of AI applications. The joint IEC and ISO technical committee prepares standards for cloud computing, including distributed platforms and edge devices, which are close to users and data collection points. The publications cover key requirements relating to data storage and recovery.

Building trust

International Standards play an important role in increasing trust in AI and help support public and private decision-making, not least because they are developed by a broad range of stakeholders. This helps to ensure that the IEC’s work strikes the right balance between the desire to deploy AI and other new technologies rapidly and the need to study their ethical implications.

The IEC has been working with a wide range of international, regional, and national organisations to develop new ways to bring stakeholders together to address the challenges of AI. These include the Swiss Federal Department of Foreign Affairs (FDFA) and the standards development organisations, ISO, and the International Telecommunication Union (ITU).

More than 500 participants followed the AI with Trust conference, in-person and online, to hear different stakeholder perspectives on the interplay between legislation, standards and conformity assessment. They followed use-case sessions on healthcare, sensor technology, and collaborative robots, and heard distinguished experts exchange ideas on how they could interoperate more efficiently to build trust in AI. The conference in Geneva was the first milestone of the AI with Trust initiative.

The IEC is also a founding member of the Open Community for Ethics in Autonomous and Intelligent Systems (OCEANIS). OCEANIS brings together standardisation organisations from around the world to enhance awareness of the role of standards in facilitating innovation and addressing issues related to ethics and values.

Read more

e-tech

IEC and ISO Work on Artificial Intelligence

AI for the Last Mile

Computational Approaches for AI Systems

–  IEC Blog

Digital Transformation

–  Video

Ian Oppermann (AI with Trust)

AI with Trust conference interviews AI Governance

Network security and critical infrastructure

The IEC develops cybersecurity standards and conformity assessments for IT and operational technology (OT). One of the biggest challenges today is that cybersecurity is often understood only in terms of IT, which leaves critical infrastructure, such as power utilities, transport systems, manufacturing plants and hospitals, vulnerable to cyberattacks.

Cyberattacks on IT and OT systems often have different consequences. The effects of cyberattacks on IT are generally economical, while cyberattacks on critical infrastructure can impact the environment, damage equipment, or even threaten public health and lives.

When implementing a cybersecurity strategy, it is essential to consider the different priorities of cyber-physical and IT systems. The IEC provides relevant and specific guidance via two of the world’s best-known cybersecurity standards: IEC 62443 for cyber-physical systems and ISO/IEC 27001 for IT systems.

Both take a risk-based approach to cybersecurity, which is based on the concept that it is neither efficient nor sustainable to try to protect all assets in equal measure. Instead, users must identify what is most valuable and requires the greatest protection and identify vulnerabilities.

Conformity assessment provides further security by ensuring that the standards are implemented correctly: IECEE certification for IEC 62443 and IECQ for ISO/IEC 27001.

ISO/IEC 27001 for IT

IT security focuses equally on protecting the confidentiality, integrity, and availability of data – the so-called CIA triad. Confidentiality is of paramount importance and information security management systems, such as the one described in ISO/IEC 27001, are designed to protect sensitive data, such as personally identifiable information (PII), intellectual property (IP), or credit card numbers, for example.

Implementing the information security management system (ISMS) described in ISO/IEC 27001 means embedding information security continuity in business continuity management systems. Organisations are shown how to plan and monitor the use of resources to identify attacks earlier and take steps more quickly to mitigate the initial impact.

IEC 62443 for OT

In cyber-physical systems, where IT and OT converge, the goal is to protect safety, integrity, availability, and confidentiality (SIAC). Industrial control and automation systems (ICAS) run in a loop to check continually that everything is functioning correctly.

The IEC 62443 series was developed because IT cybersecurity measures are not always appropriate for ICAS. ICAS are found in an ever-expanding range of domains and industries, including critical infrastructure, such as energy generation, water management, and the healthcare sector.

ICAS must run continuously to check that each component in an operational system is functioning correctly. Compared to IT systems, they have different performance and availability requirements and equipment lifetime.

Conformity assessment: IECEE

Many organisations are applying for the IEC System of Conformity Assessment Schemes for Electrotechnical Equipment and Components (IECEE) conformity assessment certification to verify that the requirements of IEC 62443 have been met.

IECEE provides a framework for assessments in line with IEC 62443, which specifies requirements for security capabilities, whether technical (security mechanisms) or process (human procedures) related. Successful recipients receive the IECEE industrial cybersecurity capability certificate of conformity.

Conformity assessment: IECQ

While certification to ISO/IEC 27001 has existed since the standard was published in 2013, it is only in recent years that the IEC Quality Assessment System for Electronic Components (IECQ) has set up a true single standardised way of assessing and certifying an ISMS to ISO/IEC 27001.

International standards such as IEC 62443 and ISO/IEC 27001 are based on industry best practices and reached by consensus. Conformity assessment confirms that they have been implemented correctly to ensure a safe and secure digital society.

Read more

Video

Digital tools

IEC has developed a number of online tools and services designed to help everyone with their daily activities.

Social media channels

Facebook @InternationalElectrotechnicalCommission

LinkedIn @IECStandards

Pinterest @IECStandards

X @IECStandards

YouTube @IECstandards

World Intellectual Property Organization

Acronym: WIPO

Established: 1967

Address: Chemin des Colombettes 34, 1211 Geneva 20, Switzerland

Website: https://www.wipo.int/

Stakeholder group: International and regional organisations

WIPO is a UN agency functioning as the global forum for intellectual property (IP) related services (patents, copyright, trademarks, and designs), policy, information, and cooperation. The organisation was established in 1967. It currently has 193 member states and over 200 observers representing non-governmental organisations (NGOs) and intergovernmental organisations. WIPO leads the development of a balanced and effective global IP ecosystem to promote innovation and creativity for a better and more sustainable future.

Digital activities

WIPO runs several online registration systems for patents and trademarks. There are also numerous databases available for use by stakeholders on the same subjects.

Digital policy issues

Frontier technologies including artificial intelligence

WIPO pays particular attention to the interplay between frontier technologies including artificial intelligence (AI) and IP.

The WIPO Conversation on IP and Frontier Technologies provides an open, inclusive forum to engage with and facilitate discussion and knowledge-building among the widest possible set of stakeholders. It leads the global discourse on the impact of frontier technologies on IP, in this fast-moving, complex space. Each year, WIPO usually holds two sessions of the Conversation covering both the uses and applications of frontier technologies to assist IP Offices and IP owners as well as more conceptual policy-based discussions to ensure that the IP systems continue to foster innovation. The five sessions of the WIPO Conversation to date have focused on AI, data, and frontier technologies in IP administration.

WIPO has prepared a paper exploring the (potential) impact of AI on IP policies in areas such as copyright and related rights, patents, trademarks, designs, and overall IP administration. It also maintains an AI and IP strategy clearing house, which collates government instruments (strategies, regulations, etc.) that are relevant to AI, data, and IP.

WIPO is also developing and deploying AI solutions in the context of various activities; relevant examples are WIPO Translate and the WIPO Brand Image Search, which use AI for automated translation and image recognition. The WIPO Index of AI Initiatives in IP Offices seeks to foster information sharing and collaboration between national IP Offices working on similar projects.

Alternative dispute resolution and critical internet resources

WIPO’sactivitiesregarding the Domain Name System(DNS) revolve around the protection of trademarks and related rights in the context of domain names. It developed the Uniform Domain-Name Dispute-Resolution Policy (UDRP) with the Internet Corporation for Assigned Names and Numbers (ICANN). Under this policy, WIPO’s Arbitration and Mediation Center provides dispute resolution services for second-level domain name registrations under generic top-level domains (gTLDs) to which the UDPR applies. The Center also administers disputes under specific policies adopted by some gTLD registries (e.g. .aero, .asia, .travel). In addition, it offers domain name dispute resolution services for over 70 country code top-level domains (ccTLDs). WIPO has developed a ccTLD Program to provide advice to many ccTLD registries on the establishment of dispute resolution procedures. It also contributes to the work carried out within the framework of ICANN in regard to the strengthening of existing trademark rights protection mechanisms or the development of new such mechanisms.

Intellectual property rights

Trademarks

WIPO has long been involved in issues related to the protection of trademarks in the context of the DNS. The first phase of the WIPO Internet Domain Name Process, carried out in 1991, explored trademark abuse in second-level domain names, and led to the adoption, by ICANN, of the UDRP. WIPO has also contributed to the development of several trademark rights protection mechanisms applicable to gTLDs (such as legal rights objections, the Trademark Clearinghouse, and the uniform rapid suspension system). The WIPO Arbitration and Mediation Center administers trademark-related dispute resolution cases for several gTLDs and ccTLDs.

Copyright

WIPO is actively contributing to international discussions on the opportunities offered by copyright in the digital environment, especially to developing economies, small and medium enterprises  (SMEs) and women entrepreneurs. The organisation administers the Internet Treaties and the Beijing Treaty, which clarify that existing copyright and related rights apply on the internet, and introduce new online rights, while also establishing international norms aimed at preventing unauthorised access to and use of creative works on the internet or other digital networks. The WIPO Accessible Books Consortium furthers the practical implementation of the Marrakesh Treaty to increase the number of books available worldwide in accessible digital formats. WIPO member states are considering topics related to copyright in the digital environment at the multilateral level. WIPO also carries out research and organises seminars and other meetings on aspects concerning challenges and possible solutions for taking advantage of the opportunities offered by copyright and related rights in the digital era.

Liability of intermediaries

Given WIPO’s concerns  regarding  the  protection of copyright and related rights on the internet, the organisation is exploring issues related to the roles and responsibilities of internet intermediaries when it comes to online copyright infringements. The organisation carries out or commissions research and publishes studies on the relationship between copyright and internet intermediaries (such as comparative analyses of national approaches to the liability of Internet intermediaries), and organises events (seminars, workshops, sessions at the World Summit on the Information Society (WSIS) Forum and Internet Governance Forum (IGF) meetings, etc.) aimed at facilitating multistakeholder discussions on the potential liability of internet intermediaries concerning copyright infringements.

  • Comparative analysis of national approaches of the liability of the internet intermediaries (I and II).

Sustainable development

WIPO is of the view that IP is a critical incentive for innovation and creativity, and, as such, a key to the success of the sustainable development goals (SDGs). The organisation works to enable member states to use the IP system to drive the innovation, competitiveness, and creativity needed to achieve the SDGs. It does so, for instance, through supporting countries in their efforts to build an innovative IP ecosystem, providing legislative advice on updating national IP laws, and supporting judiciary systems in keeping up with technological innovation. WIPO’s contribution to the implementation of the Agenda 2030 is guided by its Development Agenda.

Climate change

WIPO’s Global Challenges programme brings together various stakeholders to explore issues related to green technologies and the environment. It hosts WIPO GREEN, a multistakeholder platform aimed to promote innovation and diffusion of green technologies, and it provides analysis of relevant IP issues to facilitate international policy dialogue. The WIPO GREEN platform includes a digital database of green technologies in sectors such as energy, water and transportation. In 2022, WIPO launched the Green Technology Book, a major digital publication to showcase concrete solutions related to climate change adaptation. The report will be fully integrated with the WIPO GREEN database, allowing for continuous additions by technology providers.

  • WIPO GREEN – online marketplace for sustainable/ green technologies

Digital tools

Here are some examples of the digital tools WIPO uses in relation to its services:

  • WIPO Online Case Administration Tools, including WIPO eADR (allowing parties in a dispute, mediators, arbitrators, and experts in a WIPO case to securely submit communications electronically into an online docket) and online facilities for meetings and hearings as part of WIPO cases.
  • WIPO GREEN – online marketplace for sustainable technologies.
  • WIPO Match – platform that matches seekers of specific IP-related development needs with potential providers offering resources.
  • WIPO Alert – platform to upload information on entities that infringed copyright at national level.
  • Madrid e-services – online tools and resources.
  • Electronic Forum – enables the electronic distribution and submission by email of comments concerning preliminary draft working documents and draft reports.
  • WIPO Academy – also includes an eLearning Centre.
  • WIPO Connect – enables collective management of copyright and related rights at local and central levels.
  • ABC Global Book Service – on-line catalogue that allows participating libraries for the blind and organisations serving people who are print disabled to obtain accessible content.
  • WIPO Knowledge Centre – hosts virtual exhibitions. Recent subjects have included geographical indications, and AI.

Social media channels

Facebook @WIPO

Flickr @WIPO

Instagram @wipo

LinkedIn @WIPO

Podcast @https://www.wipo.int/podcasts/en/

X @WIPO

YouTube @WIPO

International Organization for Standardization

Acronym: ISO

Established: 1947

Address: Chemin de Blandonnet 8, 1214 Vernier, Geneva, Switzerland

Website: https://www.iso.org/iso/home.html

Stakeholder group: International and regional organisations

ISO is the International Organization for Standardization, the world’s largest developer of international standards. It consists of a global network of 170 national standards bodies – our members. Each member represents ISO in its country. The organisation brings together global experts to share knowledge and develop voluntary, consensus-based, market-relevant International Standards. It is best known for its catalogue of almost 25,000
standards spanning a wide range of sectors, including technology, food, and healthcare.

Digital activities

A large number of the international standards and related documents developed by ISO are related to information and communication technologies (ICTs), such as the Open Systems Interconnection (OSI) that was created in 1983 to establish a universal reference model for communication protocols. The organisation is also active in the field of emerging technologies including blockchain, the Internet of Things (IoT), and AI. The standards are developed by various technical committees dedicated to specific areas including information security, cybersecurity, privacy protection, AI, and intelligent transport systems.

Digital policy issues

Artificial intelligence

The joint technical committee of ISO and the International Electrotechnical Commission (IEC) for AI is known as ISO/IEC JTC1/SC 42 Artificial intelligence and is responsible for the development of standards in this area. To date, it has published 20 standards specifically pertaining to AI with 35 others in development. ISO/IEC 42001 is the flagship AI Management System Standard, which provides requirements for establishing, implementing, maintaining, and continually improving an AI management system within the context of an organisation. ISO/IEC TR 24028 provides an overview of trustworthiness in AI systems, detailing the associated threats and risks and addresses approaches on availability, resiliency, reliability, accuracy, safety, security, and privacy. The standards under development include those that cover concepts and terminology for AI (ISO/IEC 22989); bias in AI systems and AI-aided decision-making (ISO/IEC TR 24027); AI risk management (ISO/IEC 23894); a framework for AI systems using machine learning (ISO/IEC 23053); and the assessment of machine learning classification performance (ISO/IEC TS 4213). Up-to-date information on the technical committee (e.g. scope, programme of work, contact details) can be found on the committee page.

Cloud computing

ISO and IEC also have a joint committee for standards related to cloud computing which currently has 27 published standards and a further 5 in development. Of those published, two standards of note include ISO/IEC 19086-1, which provides an overview, foundational concepts, and definitions for a cloud computing service level agreement framework, and ISO/IEC 22123-3, which specifies the cloud computing reference architecture.Standards under development include those on health informatics (ISO/TR 21332); the audit of cloud services (ISO/IEC 22123-2); and data flow, categories, and use (ISO/IEC 19944 series). Up-to-date information on the technical committee (e.g. scope, programme of work, contact details) can be found on the committee page.

Internet of things

Recognising the ongoing developments in the field of IoT, ISO has a number of dedicated standards both published and in development, including those for intelligent transport systems (ISO 19079), future networks for IoT (ISO/IEC TR 29181 series), unique identification for IoT (ISO/IEC 29161), Internet of Media Things (ISO/IEC 23093-3), the trustworthiness of IoT (ISO/IEC 30149), and industrial IoT systems (ISO/IEC 30162). IoT security is addressed in standards such as ISO/IEC 27001 and ISO/IEC 27002, which provide a common language for governance, risk, and compliance issues related to information security. In addition, there are 26 standards under development, some of which provide a methodology for the trustworthiness of an IoT system or service (ISO/IEC 30147); a trustworthiness framework (ISO/IEC 30149); the requirements of an IoT data exchange platform for various IoT services (ISO/IEC 30161); and a real-time IoT framework (ISO/IEC 30165). Up-to-date information on the ISO and IEC joint technical committee for IoT (e.g. scope, programme of work, contact details) can be found on the committee page

Telecommunication infrastructure

ISO’s standardisation work in the field of telecommunications infrastructure covers areas such as planning and installation of networks (e.g. ISO/IEC 14763-2), corporate telecommunication networks (e.g. ISO/IEC 17343), local and metropolitan area networks (e.g. ISO/IEC/IEEE 8802-A), private integrated telecommunications networks (e.g. ISO/IEC TR 14475), and wireless networks. Next-generation networks – packet-based public networks able to provide telecommunications services and use multiple quality-of-service-enabled transport technologies – are equally covered (e.g. ISO/IEC TR 26905). ISO also has standards for the so-called future networks, which are intended to provide futuristic capabilities and services beyond the limitations of current networks, including the internet. Up-to-date information on the joint ISO and IEC technical committee that develops these standards (e.g. scope, programme of work, contact details ) can be found on the committee page.

Blockchain

ISO has published 11 standards on blockchain and distributed ledger technologies: ISO/TR 23455 gives an overview of smart contracts in blockchain and distributed ledger technologies; ISO/TR 23244 tackles privacy and personally identifiable information protection; and ISO 22739 covers fundamental blockchain terminology respectively. ISO also has a further eight standards on blockchain in development. These include those related to:  security management of digital asset custodians (ISO/TR 23576); taxonomy and ontology (ISO/TS 23258); and guidelines for governance (ISO/TS 23635). Up-to-date information on the technical committee (e.g. scope, programme of work, contact details, etc.) can be found on the committee page.

Emerging technologies

ISO develops standards in the area of emerging technologies. 

Dozens of standards in the area of emerging technologies are those related to robotics. ISO has more than 40 different standards either published or in development that cover issues such as collaborative robots (e.g. ISO/TS 15066); safety requirements for industrial robots (e.g. ISO 10218 series); and personal care robots (e.g. ISO 13482). Autonomous or so-called intelligent transport systems (ITS) standards are developed by ISO’s ITS Technical Committee and include those for forward vehicle collision warning systems (ISO 15623) and secure connections between trusted devices (ISO/TS 21185). Standards are also being developed to address the use of virtual reality in learning, education, and training (e.g. ISO/IEC 23843).

Network security

ISO and IEC standards also address information security and network security . The ISO and IEC 27000 family of standards covers information security management systems and are used by organisations to secure information assets such as financial data, intellectual property, and employee information. For example,ISO/IEC 27031 and ISO/IEC 27035 are specifically designed to help organisations respond, diffuse, and recover effectively from cyberattacks. ISO/IEC 27701 is an extension of ISO/IEC 27001 and ISO/IEC 27002 for privacy information management, and details requirements and guidance for establishing, implementing, maintaining, and continually improving a Privacy Information Management System (PIMS).Network security is also addressed by standards on technologies such as the IoT, smart community infrastructures, medical devices, localisation and tracking systems, and future networks. Up-to-date information on the joint ISO and IEC technical committee (e.g. scope, programme of work, contact details) can be found on the committee page.

Encryption

As more and more information (including sensitive personal data) is stored, transmitted, and processed online, the security, integrity, and confidentiality of such information becomes increasingly important. To this end, ISO has a number of standards for the encryption of data. For example, ISO/IEC 18033-1, currently under development, addresses the nature of encryption and describes certain general aspects of its use and properties. Other standards include ISO/IEC 19772 which covers authenticated encryption, ISO/IEC 18033-3 which specifies encryption systems (ciphers) for the purpose of data confidentiality, and ISO 19092 which allows for encryption of biometric data used for authentication of individuals in financial services for confidentiality or other reasons. ISO also has standards that focus on identity-based ciphers, symmetric and asymmetric encryption, public key infrastructure, and many more related areas. 

Data governance

Big data is another area of ISO standardisation; around 80% of related standards are developed by the ISO/IEC AI committee. The terminology for big-data-related standards is outlined in ISO/IEC 20546, while ISO/IEC 20547-3 covers big data reference architecture. ISO/IEC TR 20547-2 provides examples of big data use cases with application domains and technical considerations and ISO/IEC TR 20547-5 details a roadmap of existing and future standards in this area. Up-to-date information on the technical committee (e.g. scope, programme of work, contact details) can be found on the committee page.

Digital identities

Digital signatures that validate digital identities help to ensure the integrity of data and authenticity of particulars in online transactions. This, therefore, contributes to the security of online applications and services. Standards to support this technology cover elements such as anonymous digital signatures (e.g. ISO/IEC 20008 series); digital signatures for healthcare documents (e.g. ISO 17090-4 and ISO 17090-5); and blind digital signatures, which is where the content of the message to be signed is disguised, used in contexts where, for example, anonymity is required. Examples of such standards are ISO 18370-1 and ISO/IEC 18370-2.

Privacy and data protection

Privacy and data protection in the context of ICTs is another area covered by ISO’s standardisation activities. One example is ISO/IEC 29101 which describes a privacy architecture framework. Others include those for privacy-enhancing protocols and services for identification cards (ISO/IEC 19286); privacy protection requirements pertaining to learning, education, and training systems employing information technologies (ISO/IEC 29187-1); privacy aspects in the context of intelligent transport systems (ISO/TR 12859); and security and privacy requirements for health informatics (ISO/TS 14441).

Digital tools

ISO has developed an online browsing platform that provides up-to-date information on ISO standards, graphical symbols, publications, and terms and definitions.

Future of meetings

Future ISO meetings can be found at ISO – meeting calendar

Social media channels

Facebook @isostandards

Instagram @isostandards

LinkedIn @isostandards

X @isostandards

YouTube @iso

Skip to content