Please select and order
€84.27
excl. VAT
Add to cart
Norm
ÖNORM A 7700-2
Issue date: 2019 10 01
Web Applications - Part 2: Data protection requirements
ÖNORM A 7700 (all parts) specifies requirements for the safety and the safe operation of in Web applications . Furthermore security and privacy requirements are definied....
Withdrawn: 2019 12 01
Publisher:
Austrian Standards International
Format:
Digital | 15 Pages
Language:
German
Currently valid:
Optionally co-design standards:
Topics
show all
IT, communication & electronic, Applications of information technology, IT applications in other fields
IT, communication & electronic, Information technology, Open systems interconnection in general
IT, communication & electronic, Information technology, Information coding
IT, communication & electronic, Telecommunication systems, IT applications in other fields
IT, communication & electronic, Telecommunication. Telecontrol. Telemetering, IT applications in other fields
Electric & lighting engineering, Installations in buildings - Electricity supply systems, IT applications in other fields
Building services engineering & equipment, Installations in buildings - Electricity supply systems, IT applications in other fields
Services & management, Education, IT applications in other fields
ÖNORM A 7700 (all parts) specifies requirements for the safety and the safe operation of in Web applications . Furthermore security and privacy requirements are definied.
Part 2 of ÖNORM A 7700 defines security and privacy requirements for web application and theoperation of web application, due to the use personal data . The requirements of the new european privacy regulation VO ( EU)2016/679 (valid from 05.25.2018) are going to be considered.
ÖNORM A 7700
2008 12 01
Information technology - Technical requirements concerning the security of web applications
Norm
ONR 17700
2005 06 01
Information technology - Technical requirements concerning the security of web applications
Technische Regel
Norm
Issue date :
2019 10 01
Web Applications - Part 4: Requirements for secure operations