CEN/CENELEC

Available (60)

Showing 1 - 12 per page



Aleksandr Tiulkanov

Country
France
Impact on SMEs (8th Open Call)
This activity has significant impacts on AI standardization and European interests, notably related to the facilitated EU AI Act Compliance, as there will be a more clear alignment between standards and regulatory requirements will simplify compliance processes for organizations.Also, this allows reduced compliance costs and efforts, particularly beneficial for SMEs and startups in the AI sector.
Open Call
Organization
Responsible Innovations
Portrait Picture
Aleksandr Tiulkanov
Proposal Title (8th Open Call)
Enhancing AI Risk Management and QMS Standards for EU AI Act regulatory purposes in CEN/CENELEC
Standards Development Organisation
Topic (8th Open Call)

Robin Renwick

Description of Activities

The fellowship tackles the lack of international, or European, standard or technical specification that focuses explicitly on privacy and data protection capabilities of DLT systems. With this regards, ISO TS 24946 “Requirements and guidance for improving, preserving, and 
assessing the privacy capability of DLT systems” has now reached CD stage (July 2025) and will endeavour to move through this process and be completed in 2026. This process requires continued support from experts to ensure delivery, as scheduled. In this sense, the priority of this activity focuses  at the European level, CEN/CENELEC  JTC 19/WG3 to produce a European standard on PII protection within DLT which is strongly influenced by ‘DIN Spec 4997 - Privacy by Blockchain Design’ and the aforementioned ISO TS 24946. This European specification will seek to harmonise the GDPR and recent EDPB guidance to produce a technical specification intended for the European DLT ecosystem. 
This European specification will provide much needed clarity for the DLT ecosystem as regards data protection and privacy capabilities, affordances, and assessment. Further harmonisation between the international specification at ISO and the European standard will support interoperability, and ensure that privacy and data protection capabilities are harmonised globally. The main challenges concerns exacting requirements from regulations such as Article 76(3) of MiCAR, as well as Article 79(1) of the European AMLR will require navigation. Standards 
require alignment and compatibility with those legal texts, as well as corresponding regulations regarding personal data, data markets, and trust services (e.g., GDPR, Data Act, eIDAS2). Ensuring there are no gaps between regulatory texts and the proposed European standards will be a primary focus. Also, it must be ensured that there are no substantial gaps between international specifications and European standards will be the second focus. Standards alignment between ISO and CEN/CENELEC is viewed as a key outcome to benefit the global DLT ecosystem, and one that requires strong consensus building, given slightly different international privacy perspectives and preferences.

Country
Ireland
Open Call Topics
Open Call
Organisation type
Organization
Trilateral Research
Portrait Picture
Robin Renwick
Proposal Title (8th Open Call)
Harmonisation of ISO TS 24946 and CEN/CLC/ JTC19 WG3
Standards Development Organisation
Topic
E-privacy
StandICT.eu Year
2026
Topic (8th Open Call)

Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2016)

This document provides a standardized IoT Reference Architecture using a common vocabulary, reusable designs and industry best practices. It uses a top down approach, beginning with collecting the most important characteristics of IoT, abstracting those into a generic IoT Conceptual Model, deriving a high level system based reference with subsequent dissection of that model into the four architecture views (functional view, system view, networking view and usage view) from different perspectives.

EN ISO/IEC 27000:2017

Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015)

The standard provides guidelines for the security standards of organizational information and information security management practices, including the selection, implementation and management of controls, taking into account the risk environment for the security of the organisation information.

EN ISO/IEC 27002:2017

Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012)

The standard defines the specific guidelines for the management of digital data which are the identification, collection, acquisition and preservation of digital evidence that can be of probative value. This standard provides guidance to individuals regarding common situations encountered during the processing of digital data and assists organizations in their disciplinary procedures and in facilitating the exchange of potential digital evidence between jurisdictions.

EN ISO/IEC 27037:2016

Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method (ISO/IEC 27041:2015)

The standard provides a guideline on the mechanisms to ensure that the methods and processes used in the investigation of information security incidents are "fit for purpose". It contains the best practices regarding the definition of the requirements, the description of the methods, and demonstration of how the implementation of the methods can satisfy the requests. It also includes considerations on how vendors and third parties can be used to help this warranty process.

EN ISO/IEC 27041:2016

Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence (ISO/IEC 27042:2015)

This standard provides a guide for the analysis and interpretation of digital data in a way that highlights problems related to continuity, validity, reproducibility and repeatability. It encompasses the best practices for selecting, designing and implementing sufficient information analysis and registration processes to allow processes to be subjected to independent review if necessary. It also provides guidance on the appropriate mechanisms to demonstrate the professionalism and competence of the investigation team.

EN ISO/IEC 27042:2016

Decentralised Identity Management Model based on Blockchain and other Distributed Ledgers Technologies — Part 1: Generic Reference Framework

The proposed standard will specify a reference architecture for decentralised identity management, optionally enabled by distributed ledger technology (DLT) and blockchain systems. The reference architecture aims to natural persons and legal entities and addresses concepts, cross-cutting aspects, architectural considerations, and architecture views, including functional components, roles, activities, and their relationships with blockchain and DLT. Technical specifications of the legal identity itself and specifically those of official identity documents issued by competent authorities are outside the scope of this standard, since they are regulated based on its own legislation and technical standards. Likewise, this standard does not aim to define specifications that are within the scope of REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC, currently in force, but to support the Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL amending Regulation (EU) No 910/2014 as regards establishing a framework for a European Digital Identity (COM/2021/281 final, eIDAS 2 Proposal), which includes the provision by Member States of EU Digital Identity Wallets as an enabler for personal identification and qualified trust services, including the issuance of qualified electronic attestations of identity attributes. The standard does not aim to impose any device identification procedure before third parties, without prejudice of any wallet authentication capability required by the eIDAS 2 Proposal. The standard will meet at least the following criteria: - it is technologically neutral; - it is compatible with other relevant international standards on digital identity, such as ISO/IEC 24760, - it is applicable to identity attributes of natural persons, legal entities and things, - the application of this standard allows compliance with current privacy and personal data protection regulation, when appropriate, - it is aligned with the relevant provisions of the eIDAS 2 Regulation proposal, - it enables the deployment of practical, usable, flexible and cost-efficient decentralised identity management systems, - it takes into account the specific needs of small and medium-sized enterprises (SMEs); and, - it is suitable for use in business-to-business relationships with individuals and legal entities.

CEN/CLC/TS XXXX JT019002