BS EN ISO 19650-5:2020

Organization and digitization of information about buildings and civil engineering works, including building information modelling (BIM) Information management using building information modelling Part 5: Security-minded approach to information management

Read More »
Common Data Environment (CDE)
Jarek Wityk

Common Data Environment (CDE)

ELI5-S1: BIM Basics E2: CDE Explained The purpose of using Common Data Environment (CDE) on a project is to provide the right person with the right information at the right

Read More »

security

state of relative freedom from threat (3.13) or harm caused by deliberate, unwanted, hostile or malicious acts [cited from ISO 19650-5:2020(en), 3.7]

Read More »
Dictionary
Jarek Wityk

BS EN ISO IEC 27000:2020

Information technology – Security techniques – Information security management systems – Overview and vocabulary ISO 27000 is derived from the British Standard 7799, published in 1995 in three parts: BS-7799,

Read More »

BS 7799‑3:2017

Information security management systemsPart 3: Guidelines for information security risk management (revision of BS ISO/IEC 27005:2011)

Read More »

System of systems

A system of systems is a collection of many different systems, each with its own characteristics. [1] System theory assumes that certain underlying concepts and principles are applicable to different

Read More »

System of engagement

The System of Engagement is defined as a platform that manages supported digital engagement, of systems like Browsing, Web Chat, Messaging, videos (Facebook, WhatsApp, TEAMS, ZOOM, Signal, Slack, etc.), various

Read More »

Security Management Plan

A document (or part of a document) identified in the Information Particulars setting out the security requirements for carrying out the Works in a security-minded way, including any policies, protocols,

Read More »
Classification and Standardisation
Jarek Wityk

Sensitive Information

ELI5-S1 BIM Basics E16_Sensitive Information information, the loss, misuse or modification of which, or unauthorized access to, could:(a) adversely affect the privacy, welfare or safety of an individual or individuals;(b)

Read More »
On this page

    share this page