{"id":346905,"date":"2024-10-20T00:23:27","date_gmt":"2024-10-20T00:23:27","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-188292017\/"},"modified":"2024-10-25T23:51:50","modified_gmt":"2024-10-25T23:51:50","slug":"bs-iso-188292017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-188292017\/","title":{"rendered":"BS ISO 18829:2017"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
10<\/td>\n4 Trustworthy ECM system assessment
4.1 General
4.1.1 Assessment output <\/td>\n<\/tr>\n
11<\/td>\n4.1.2 Process review <\/td>\n<\/tr>\n
12<\/td>\n4.1.3 Fulfilling legal, government and regulatory requirements
4.2 Assessment activities
4.2.1 Review of existing business practice and other organizational documentation
4.2.2 Evaluating information ingested into the system <\/td>\n<\/tr>\n
13<\/td>\n4.2.3 Readability <\/td>\n<\/tr>\n
14<\/td>\n4.3 Evaluating information retention, preservation and destruction
4.3.1 Application interoperability
4.3.2 Data migration between electronic storage media
4.3.3 Data format conversion
4.3.4 Media monitoring program
4.3.5 Data expunging\/deletion
4.4 System security
4.4.1 Security-related information to be collected\/reviewed <\/td>\n<\/tr>\n
15<\/td>\n4.4.2 Securing the information to prevent unauthorized modification or deletion of ESI
4.5 Evaluating information access
4.5.1 General <\/td>\n<\/tr>\n
16<\/td>\n4.5.2 Managing authorized modification
4.6 Evaluating history and audit trail information
4.6.1 General
4.6.2 Retrieval of previous document version required to be maintained <\/td>\n<\/tr>\n
17<\/td>\n4.6.3 Management of notes and annotations as part of a business record
4.6.4 Management of ESI containing macros and\/or external links <\/td>\n<\/tr>\n
18<\/td>\n4.7 Evaluating technical and data storage environments
4.7.1 Information security models
4.7.2 Storage technologies assessment
4.7.3 Technology standards being followed by organization
4.7.4 Primary and secondary storage <\/td>\n<\/tr>\n
20<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Document management. Assessing ECM\/EDRM implementations. Trustworthiness<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2017<\/td>\n24<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":346911,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-346905","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/346905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/346911"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=346905"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=346905"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=346905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}