热门 品质管理&苍产蝉辫;&驳迟; ISO 9001 温室气体确/查证&苍产蝉辫;&驳迟; ISO 14064 环境管理&苍产蝉辫;&驳迟; ISO 14001 营运持续管理&苍产蝉辫;&驳迟; ISO 22301 资讯安全管理&苍产蝉辫;&驳迟; ISO/IEC 27001 职业安全卫生&苍产蝉辫;&驳迟; ISO 45001 查看所有标準 >
关於标準 标準是什麼 > BSI 的角色 > ISO(國際标準組織)、IEC(國際電工委員會)、CEN(歐洲标準委員會)、CENELEC(歐洲電子技術标準委員會)、ETSI(歐洲電信标準協會) 参与&苍产蝉辫;&驳迟; 成為标準制定者,加入委員會並成為标準社群的一員
标準和資訊 取得與購買标準 > 制定标準 > 線上訂閱服务 > BSI Knowledge、Compliance Navigator、Eurocodes PLUS、BSI 會員資格 知識服务 > 制定戰略、創建新标準和框架、研究和見解以及諮詢諮詢服务
稽核、验证、教育训练 评估与验证&苍产蝉辫;&驳迟; 稽核与查证&苍产蝉辫;&驳迟; 产物测试与验证&苍产蝉辫;&驳迟; BSI Kitemark(風箏標誌), CE 標誌和驗證, 產品上市解決方案 查驗 BSI 頒發之證書 >
BSI 产业報告、研究、新聞 塑造社會 5.0 — AI 人工智慧 > 全球市场进入&苍产蝉辫;&驳迟; 健康和安全&苍产蝉辫;&驳迟; 资讯安全&苍产蝉辫;&驳迟; 网路安全、隐私(骋顿笔搁)和合规性
部落格 環境、社會、公司治理 (ESG) > 数位信任与资讯韧性&苍产蝉辫;&驳迟; 人居环境&苍产蝉辫;&驳迟; 食品&苍产蝉辫;&驳迟; 医疗器材&苍产蝉辫;&驳迟; 瀏览全部文章&苍产蝉辫;&驳迟;
Security technology solutions > We partner with leading cloud security vendors Security testing > Vulnerability Assessment, Penetration Testing, Attack Simulation Third party security and risk assessment > Implement a robust information risk management framework eDiscovery and forensics > Understand the data that your organization holds
Virtual CISO > Find the right vCISO Business continuity consulting services > Make your business resilient to an ever changing and challenging world IoT and OT security > Increase trust in your connected systems and technologies strategy GovAssure > Strengthening security for the public sector View all our cybersecurity services >
Data protection ( GDPR ) > Achieving and maintaining compliance with GDPR eDiscovery and Digital forensics > Understand and take control of your data Data subject requests (DSAR) support > Simplify, automate and reduce your response time for DSARs
DPO as a service > Quickly access to specialized, skilled and experienced consultants Article 27 Representation > Ensure your organization meets GDPR compliance obligations Data Protection Impact Assessment (DPIA) support > Minimize privacy and security risk View all our privacy and data protection solutions >
PCI DSS > Discover our range of PCI DSS consultancy services Network and Information Systems Directive (NIS) > Achieve NIS compliance ISO27001 consulting services > Identify and prioritize key risks across the organization Digital Operational Resilience Act (DORA) > Withstand and recover from ICT Incidents
Cyber Lab (CAS, CPA, CTAS) > Carry out assessments against recognized NCSC schemes SOC 2 > Identify all services and solutions to be considered in-scope for the SOC report Internet of Things (IOT) > Enabling a smart and secure world View all our compliance services >