{"id":381380,"date":"2024-10-20T03:11:17","date_gmt":"2024-10-20T03:11:17","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-142982021\/"},"modified":"2024-10-26T05:47:08","modified_gmt":"2024-10-26T05:47:08","slug":"bs-iso-142982021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-142982021\/","title":{"rendered":"BS ISO 14298:2021"},"content":{"rendered":"
This document specifies requirements for a security printing management system for security printers.<\/p>\n
This document specifies a minimum set of security printing management system requirements. Organizations ensure that customer security requirements are met as appropriate, provided these do not conflict with the requirements of this document.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4 Context of the organization 4.1 Understanding the organization and its context 4.2 Understanding the needs and expectations of interested parties <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4.3 Determining the scope of the security printing management system 4.4 Security printing management system <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5 Leadership 5.1 Leadership and commitment <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.2 Policy 5.3 Organization roles, responsibilities and authorities 6 Planning 6.1 Actions to address risk and opportunities <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.2 Security objectives and planning to achieve them 6.3 Security printing management system planning <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7 Support 7.1 Resources 7.2 Competence 7.3 Awareness <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.4 Communication 7.5 Documented information 7.5.1 General <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7.5.2 Creating and updating 7.5.3 Control of documented information <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 8 Operation 9 Performance evaluation 9.1 Monitoring, measurement, analysis and evaluation 9.2 Internal audit <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 9.3 Management review <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 10 Improvement 10.1 Nonconformity, security breaches and corrective actions 10.2 Preventive actions <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 10.3 Continual improvement <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Annex A (normative) Determination of security requirements related to the security printing management system <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Graphic technology. Management of security printing processes<\/b><\/p>\n |