{"id":305179,"date":"2024-10-19T20:52:56","date_gmt":"2024-10-19T20:52:56","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-142982013\/"},"modified":"2024-10-25T18:27:22","modified_gmt":"2024-10-25T18:27:22","slug":"bs-iso-142982013","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-142982013\/","title":{"rendered":"BS ISO 14298:2013"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Section sec_1 Section sec_2 Section sec_3 1\tScope 2\tNormative references 3\tTerms and definitions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Section sec_4 Section sec_4.1 Section sec_4.2 4\tContext of the organization 4.1\tUnderstanding the organization and its context 4.2\tUnderstanding the needs and expectations of interested parties <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | Section sec_4.3 Section sec_4.4 4.3\tDetermining the scope of the security printing management system 4.4\tSecurity printing management system <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | Section sec_5 Section sec_5.1 5\tLeadership 5.1\tLeadership and commitment <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | Section sec_5.2 Section sec_5.3 5.2\tPolicy 5.3\tOrganization roles, responsibilities and authorities <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | Section sec_6 Section sec_6.1 Section sec_6.2 6\tPlanning 6.1\tActions to address risks and opportunities 6.2\tSecurity objectives and planning to achieve them <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Section sec_6.3 Section sec_7 Section sec_7.1 Section sec_7.2 6.3\tSecurity printing management system planning 7\tSupport 7.1\tResources 7.2\tCompetence <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Section sec_7.3 Section sec_7.4 Section sec_7.5 Section sec_7.5.1 7.3\tAwareness 7.4\tCommunication 7.5\tDocumented information <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Section sec_7.5.2 Section sec_7.5.3 <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Section sec_8 Section sec_9 Section sec_9.1 8\tOperation 9\tPerformance evaluation 9.1\tMonitoring, measurement, analysis and evaluation <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Section sec_9.2 Section sec_9.3 9.2\tInternal audit 9.3\tManagement review <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Section sec_10 Section sec_10.1 Section sec_10.2 10\tImprovement 10.1\tNonconformity, security breaches and corrective actions 10.2\tPreventive actions <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Section sec_10.3 10.3\tContinual improvement <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Annex sec_A Annex sec_A.1 Annex sec_A.2 Annex sec_A.3 Annex sec_A.3.1 Annex sec_A.3.2 Annex\u00a0A \n(normative)<\/p>\n Determination of security requirements related to the security printing management system <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Annex sec_A.3.3 Annex sec_A.4 Annex sec_A.4.1 Annex sec_A.4.2 Annex sec_A.4.3 <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Annex sec_A.5 Annex sec_A.5.1 Annex sec_A.5.2 Annex sec_A.5.3 Annex sec_A.5.4 Annex sec_A.5.5 <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Reference ref_1 Reference ref_2 Reference ref_3 Reference ref_4 Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Graphic technology. Management of security printing processes<\/b><\/p>\n |