AS/NZS 4444.1:1999
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information security management Code of practice for information security management
Hardcopy , PDF 1 User , PDF 3 Users , PDF 5 Users , PDF 9 Users
27-05-2024
English
05-12-1999
Gives recommendations for information security management for use by those who are responsible for initiating, implementing or maintaining security in their organization. It is intended to provide a common basis for developing organizational security standards and effective security management practice and to provide confidence in inter-organizational dealings. This Standard is identical to BS 7799.1:1999.
Committee |
IT-012
|
DocumentType |
Standard
|
ISBN |
0 7337 3050 7
|
Pages |
91
|
PublisherName |
Standards Australia
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
This Standard gives recommendations for information security management for use by those who are responsible for initiating, implementing or maintaining security in their organization. It is intended to provide a common basis for developing organizational security standards and effective security management practice and to provide confidence in inter-organizational dealings.
Standards | Relationship |
BS 7799-1:1999 | Identical |
First published as AS/NZS 4444:1996.
Revised and redesignated as AS/NZS 4444.1:1999.
CSA ISO/IEC TR 14516 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
CAN/CSA-ISO/IEC TR 14516-04 (R2017) | Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15) |
CSA ISO/IEC TR 14516 : 2004 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
ISO/IEC TR 14516:2002 | Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
BS ISO/IEC TR 14516:2002 | Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
HB 248-2001 | Organisational experiences in implementing information security management systems |
HB 231:2000 | Information security risk management guidelines |
HB 248-2001 | Organisational experiences in implementing information security management systems |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.
Logging out.