EN ISO 22300:2018
(Main)Security and resilience - Vocabulary (ISO 22300:2018)
Security and resilience - Vocabulary (ISO 22300:2018)
ISO 22300:2018 defines terms used in security and resilience standards.
Sicherheit und Resilienz — Vokabular (ISO 22300:2018)
Dieses Dokument legt Begriffe fest, die in den Normen zur Sicherheit und Resilienz verwendet werden.
Sécurité et résilience - Vocabulaire (ISO 22300:2018)
ISO 2300:2018 définit les termes utilisés dans les normes relatives à la sécurité et à la résilience.
Varnost in vzdržljivost - Terminologija (ISO 22300:2018)
Ta dokument določa izraze s področja standardov varnosti in odpornosti.
General Information
- Status
- Withdrawn
- Publication Date
- 06-Mar-2018
- Withdrawal Date
- 27-Jan-2026
- Technical Committee
- CEN/TC 391 - Societal and Citizen Security
- Drafting Committee
- CEN/TC 391 - Societal and Citizen Security
- Current Stage
- 9960 - Withdrawal effective - Withdrawal
- Start Date
- 10-Mar-2021
- Completion Date
- 28-Jan-2026
Relations
- Effective Date
- 08-Jun-2022
- Effective Date
- 17-Mar-2021
Get Certified
Connect with accredited certification bodies for this standard

BSI Group
BSI (British Standards Institution) is the business standards company that helps organizations make excellence a habit.

Bureau Veritas
Bureau Veritas is a world leader in laboratory testing, inspection and certification services.

DNV
DNV is an independent assurance and risk management provider.
Sponsored listings
Frequently Asked Questions
EN ISO 22300:2018 is a standard published by the European Committee for Standardization (CEN). Its full title is "Security and resilience - Vocabulary (ISO 22300:2018)". This standard covers: ISO 22300:2018 defines terms used in security and resilience standards.
ISO 22300:2018 defines terms used in security and resilience standards.
EN ISO 22300:2018 is classified under the following ICS (International Classification for Standards) categories: 01.040.03 - Services. Company organization, management and quality. Administration. Transport. Sociology. (Vocabularies); 03.100.01 - Company organization and management in general. The ICS classification helps identify the subject area and facilitates finding related standards.
EN ISO 22300:2018 has the following relationships with other standards: It is inter standard links to EN ISO 22300:2014, EN ISO 22300:2021. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
EN ISO 22300:2018 is available in PDF format for immediate download after purchase. The document can be added to your cart and obtained through the secure checkout process. Digital delivery ensures instant access to the complete standard document.
Standards Content (Sample)
SLOVENSKI STANDARD
01-maj-2018
1DGRPHãþD
SIST EN ISO 22300:2014
Varnost in vzdržljivost - Terminologija (ISO 22300:2018)
Security and resilience - Vocabulary (ISO 22300:2018)
Sicherheit und Resilienz - Terminologie (ISO 22300:2018)
Sécurité sociétale - Terminologie (ISO 22300:2018)
Ta slovenski standard je istoveten z: EN ISO 22300:2018
ICS:
01.040.03 Storitve. Organizacija Services. Company
podjetja, vodenje in kakovost. organization, management
Uprava. Transport. and quality. Administration.
Sociologija. (Slovarji) Transport. Sociology.
(Vocabularies)
03.100.01 Organizacija in vodenje Company organization and
podjetja na splošno management in general
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
EN ISO 22300
EUROPEAN STANDARD
NORME EUROPÉENNE
March 2018
EUROPÄISCHE NORM
ICS 01.040.03; 03.100.01 Supersedes EN ISO 22300:2014
English Version
Security and resilience - Vocabulary (ISO 22300:2018)
Sécurité et résilience - Vocabulaire (ISO 22300:2018) Sicherheit und Resilienz - Terminologie (ISO
22300:2018)
This European Standard was approved by CEN on 22 January 2018.
CEN members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for giving this
European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical references
concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to any CEN
member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by
translation under the responsibility of a CEN member into its own language and notified to the CEN-CENELEC Management
Centre has the same status as the official versions.
CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia,
Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania,
Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland,
Turkey and United Kingdom.
EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION
EUROPÄISCHES KOMITEE FÜR NORMUNG
CEN-CENELEC Management Centre: Rue de la Science 23, B-1040 Brussels
© 2018 CEN All rights of exploitation in any form and by any means reserved Ref. No. EN ISO 22300:2018 E
worldwide for CEN national Members.
Contents Page
European foreword . 3
European foreword
This document (EN ISO 22300:2018) has been prepared by Technical Committee ISO/TC 292 “Security
and resilience” in collaboration with Technical Committee CEN/TC 391 “Societal and citizen security”
the secretariat of which is held by NEN.
This European Standard shall be given the status of a national standard, either by publication of an
identical text or by endorsement, at the latest by September 2018, and conflicting national standards
shall be withdrawn at the latest by September 2018.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CEN shall not be held responsible for identifying any or all such patent rights.
This document supersedes EN ISO 22300:2014.
According to the CEN-CENELEC Internal Regulations, the national standards organizations of the
following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,
Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia,
France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta,
Netherlands, Norway, Poland, Portugal, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland,
Turkey and the United Kingdom.
Endorsement notice
The text of ISO 22300:2018 has been approved by CEN as EN ISO 22300:2018 without any modification.
INTERNATIONAL ISO
STANDARD 22300
Second edition
2018-02
Security and resilience — Vocabulary
Sécurité et résilience — Vocabulaire
Reference number
ISO 22300:2018(E)
©
ISO 2018
ISO 22300:2018(E)
© ISO 2018
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva, Switzerland
Tel. +41 22 749 01 11
Fax +41 22 749 09 47
copyright@iso.org
www.iso.org
Published in Switzerland
ii © ISO 2018 – All rights reserved
ISO 22300:2018(E)
Contents Page
Foreword .iv
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
Bibliography .35
ISO 22300:2018(E)
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www .iso .org/ directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www .iso .org/ patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation on the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO’s adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see the following
URL: www .iso .org/ iso/ foreword .html.
This document was prepared by Technical Committee ISO/TC 292, Security and resilience.
This second edition cancels and replaces the first edition (ISO 22300:2012), which has been technically
revised.
The main changes compared to the previous edition are that terms have been added from recent
published documents and documents transferred to ISO/TC 292.
iv © ISO 2018 – All rights reserved
INTERNATIONAL STANDARD ISO 22300:2018(E)
Security and resilience — Vocabulary
1 Scope
This document defines terms used in security and resilience standards.
2 Normative references
There are no normative references in this document.
3 Terms and definitions
ISO and IEC maintain terminological databases for use in standardization at the following addresses:
— IEC Electropedia: available at http:// www .electropedia .org/
— ISO Online browsing platform: available at https:// www .iso .org/ obp
3.1
activity
process (3.180) or set of processes undertaken by an organization (3.158) (or on its behalf) that produces
or supports one or more products or services (3.181)
EXAMPLE Accounts, call centre, IT, manufacture, distribution.
3.2
affected area
location that has been impacted by a disaster (3.69)
Note 1 to entry: The term is more relevant to immediate evacuations (3.80).
3.3
after-action report
document (3.71) which records, describes and analyses the exercise (3.83), drawing on debriefs and
reports from observers (3.154), and derives lessons from it
Note 1 to entry: The after-action report documents the results from the after-action review (3.197).
Note 2 to entry: An after-action report is also called a final exercise report.
3.4
alert
part of public warning (3.183) that captures attention of first responders and people at risk (3.166) in a
developing emergency (3.77) situation
3.5
all clear
message or signal that the danger is over
3.6
all-hazards
naturally occurring event (3.82), human induced event (both intentional and unintentional) and
technology caused event with potential impact (3.107) on an organization (3.158), community (3.42) or
society and the environment on which it depends
ISO 22300:2018(E)
3.7
alternate worksite
work location, other than the primary location, to be used when the primary location is not accessible
3.8
appropriate law enforcement and other government officials
government and law enforcement personnel (3.169) that have specific legal jurisdiction over the
international supply chain (3.127) or portions of it
3.9
area at risk
location that could be affected by a disaster (3.69)
Note 1 to entry: The term is more relevant to preventative evacuations (3.80).
3.10
asset
anything that has value to an organization (3.158)
Note 1 to entry: Assets include but are not limited to human, physical, information (3.116), intangible and
environmental resources (3.193).
3.11
attack
successful or unsuccessful attempt(s) to circumvent an authentication solution (3.19), including attempts
to imitate, produce or reproduce the authentication elements (3.17)
3.12
attribute data management system
ADMS
system that stores, manages and controls access of data pertaining to objects (3.151)
3.13
audit
systematic, independent and documented process (3.180) for obtaining audit evidence and evaluating it
objectively to determine the extent to which the audit criteria are fulfilled
Note 1 to entry: The fundamental elements of an audit include the determination of the conformity (3.45) of an
object (3.151) according to a procedure (3.179) carried out by personnel (3.169) not being responsible for the
object audited.
Note 2 to entry: An audit can be an internal audit (first party) or an external audit (second party or third party),
and it can be a combined audit or a joint audit.
Note 3 to entry: Internal audits, sometimes called first-party audits, are conducted by, or on behalf of, the
organization (3.158) itself for management (3.135) review (3.197) and other internal purposes, and can form the
basis for an organization’s declaration of conformity. Independence can be demonstrated by the freedom from
responsibility for the activity (3.1) being audited.
Note 4 to entry: External audits include those generally called second- and third-party audits. Second-party
audits are conducted by parties having an interest in the organization, such as customers, or by other persons
on their behalf. Third-party audits are conducted by external, independent auditing organizations such as those
providing certification/registration of conformity or government agencies.
Note 5 to entry: When two or more management systems (3.137) are audited together, this is termed a
combined audit.
Note 6 to entry: When two or more auditing organizations cooperate to audit a single auditee, this is termed a
joint audit.
Note 7 to entry: “Audit evidence” and “audit criteria” are defined in ISO 19011.
Note 8 to entry: ISO 28000 specifies the requirements (3.190) for a security management (3.227) system.
2 © ISO 2018 – All rights reserved
ISO 22300:2018(E)
[SOURCE: ISO 9000:2015, 3.13.1, modified — Note 5 to entry has been replaced and Notes 6 to 8 to
entry have been added.]
3.14
auditor
person who conducts an audit (3.13)
[SOURCE: ISO 19011:2011, 3.8]
3.15
authentic material good
material good (3.139) produced under the control of the legitimate manufacturer, originator of the
goods (3.98) or rights holder (3.198)
3.16
authentication
process (3.180) of corroborating an entity (3.79) or attributes with a specified or understood level of
assurance
3.17
authentication element
tangible object (3.151), visual feature or information (3.116) associated with a material good (3.139) or
its packaging that is used as part of an authentication solution (3.19)
3.18
authentication function
function performing authentication (3.16)
3.19
authentication solution
complete set of means and procedures (3.179) that allows the authentication (3.16) of a material good
(3.139) to be performed
3.20
authentication tool
set of hardware and/or software system(s) that is part of an anti-counterfeiting solution and is used to
control the authentication element (3.17)
3.21
authoritative source
official origination of an attribute which is also responsible for maintaining that attribute
3.22
authorized economic operator
party involved in the international movement of goods (3.98) in whatever function that has been
approved by or on behalf of a national customs administration as conforming to relevant supply chain
(3.251) security standards
Note 1 to entry: “Authorized economic operator” is a term defined in the World Customs Organization (WCO)
(3.277) Framework of Standards.
Note 2 to entry: Authorized economic operators include, among others, manufacturers, importers, exporters,
brokers, carriers, consolidators, intermediaries, ports, airports, terminal operators, integrated operators,
warehouses and distributors.
3.23
automated interpretation
process (3.180) that automatically evaluates authenticity by one or more components of the
authentication solution (3.19)
ISO 22300:2018(E)
3.24
business continuity
capability of an organization (3.158) to continue the delivery of products or services (3.181) at acceptable
predefined levels following a disruption (3.70)
3.25
business continuity management
holistic management (3.135) process (3.180) that identifies potential threats (3.259) to an organization
(3.158) and the impact (3.107) those threats, if realized, can cause on business operations, and provides
a framework for building organizational resilience (3.192) with the capability of an effective response
that safeguards the interests of key interested parties (3.124), reputation, brand and value-creating
activities (3.1)
3.26
business continuity management system
BCMS
part of the overall management system (3.137) that establishes, implements, operates, monitors, reviews
(3.197), maintains and improves business continuity (3.24)
Note 1 to entry: The management system includes organizational structure, policies, planning (3.170) activities
(3.1), responsibilities, procedures (3.179), processes (3.180) and resources (3.193).
3.27
business continuity plan
documented procedures (3.179) that guide an organization to respond, recover, resume and restore
itself to a pre-defined level of operation following a disruption (3.70)
Note 1 to entry: Typically this covers resources (3.193), services and activities (3.1) required to ensure the
continuity (3.49) of critical business functions.
3.28
business continuity programme
ongoing management (3.135) and governance process (3.180) supported by top management (3.263)
and appropriately resourced to implement and maintain business continuity management (3.25)
3.29
business impact analysis
process (3.180) of analysing activities (3.1) and the effect that a business disruption (3.70) can have
upon them
3.30
business partner
contractor, supplier or service provider with whom an organization (3.158) contracts to assist the
organization in its function as an organization in the supply chain (3.159)
3.31
capacity
combination of all the strengths and resources (3.193) available within an organization (3.158),
community (3.42) or society that can reduce the level of risk (3.199) or the effects of a crisis (3.59)
Note 1 to entry: Capacity can include physical, institutional, social, or economic means as well as skilled personnel
(3.169) or attributes such as leadership and management (3.135).
3.32
cargo transport unit
road freight vehicle, railway freight wagon, freight container, road tank vehicle, railway tank wagon or
portable tank
4 © ISO 2018 – All rights reserved
ISO 22300:2018(E)
3.33
certified client
organization (3.158) whose supply chain (3.251) security management (3.227) system has been
certified/registered by a qualified third party
3.34
civil protection
measures taken and systems implemented to preserve the lives and health of citizens, their properties
and their environment from undesired events (3.82)
Note 1 to entry: Undesired events can include accidents, emergencies and disasters (3.69).
3.35
client
entity (3.79) that hires, has formerly hired, or intends to hire an organization (3.158) to perform security
operations (3.232) on its behalf, including, as appropriate, where such an organization subcontracts
with another company or local forces
EXAMPLE Consumer, contractor, end-user, retailer, beneficiary, purchaser.
Note 1 to entry: A client can be internal (e.g. another division) or external to the organization.
3.36
closed-circuit television system
CCTV system
surveillance system comprised of cameras, recorders, interconnections and displays that are used to
monitor activities in a store, a company or more generally a specific infrastructure (3.117) and/or a
public place
3.37
colour blindness
total or partial inability of a person to differentiate between certain hues (3.101)
3.38
colour-code
set of colours used symbolically to represent particular meanings
3.39
command and control
activities (3.1) of target-orientated decision making, including assessing the situation, planning (3.170),
implementing decisions and controlling the effects of implementation on the incident (3.111)
Note 1 to entry: This process (3.180) is continuously repeated.
3.40
command and control system
system that supports effective emergency management (3.78) of all available assets (3.10) in a
preparation, incident response (3.115), continuity (3.49) and/or recovery (3.187) process (3.180)
3.41
communication and consultation
continual and iterative processes (3.180) that an organization (3.158) conducts to provide, share
or obtain information (3.116), and to engage in dialogue with interested parties (3.124) and others
regarding the management (3.135) of risk (3.199)
Note 1 to entry: The information can relate to the existence, nature, form, likelihood (3.133), severity, evaluation
(3.81), acceptability, treatment or other aspects of the management of risk and security operations management
(3.233).
Note 2 to entry: Consultation is a two-way process of informed communication between an organization and
its interested parties or others on an issue, prior to making a decision or determining a direction on that issue.
Consultation is
ISO 22300:2018(E)
— a process which impacts on a decision through influence rather than power, and
— an input to decision making, not joint decision making.
[SOURCE: ISO/Guide 73:2009, 3.2.1, modified — In the definition, “stakeholders” has been changed to
“interested parties and others” and Note 1 to entry has been modified.]
3.42
community
group of associated organizations (3.158), individuals and groups sharing common interests
Note 1 to entry: Impacted communities are the groups of people and associated organizations affected by the
provision of security (3.223) services, projects or operations.
3.43
community-based warning system
method to communicate information (3.116) to the public through established networks
3.44
competence
ability to apply knowledge and skills to achieve intended results
[SOURCE: ISO 9000:2015, 3.10.4, modified — Notes 1 and 2 to entry have been deleted.]
3.45
conformity
fulfilment of a requirement (3.190)
[SOURCE: ISO 9000:2015, 3.6.11, modified — Notes 1 and 2 to entry have been deleted.]
3.46
consequence
outcome of an event (3.82) affecting objectives (3.153)
Note 1 to entry: An event can lead to a range of consequences.
Note 2 to entry: A consequence can be certain or uncertain and can have positive or negative effects on objectives.
Note 3 to entry: Consequences can be expressed qualitatively or quantitatively.
Note 4 to entry: Initial consequences can escalate through cumulative effects from one event setting off a chain
of events.
Note 5 to entry: Consequences are graded in terms of the magnitude or severity of the impacts (3.107).
[SOURCE: ISO/Guide 73:2009, 3.6.1.3, modified — Note 5 to entry has been added.]
3.47
contingency
possible future event (3.82), condition or eventuality
3.48
continual improvement
recurring activity (3.1) to enhance performance (3.167)
[SOURCE: ISO 9000:2015, 3.3.2, modified — Notes 1 and 2 to entry have been deleted.]
6 © ISO 2018 – All rights reserved
ISO 22300:2018(E)
3.49
continuity
strategic and tactical capability, pre-approved by management (3.135), of an organization (3.158) to
plan for and respond to conditions, situations and events (3.82) in order to continue operations at an
acceptable predefined level
Note 1 to entry: Continuity is the more general term for operational and business continuity (3.24) to ensure an
organization’s ability to continue operating outside of normal operating conditions. It applies not only to for-
profit companies, but to organizations of all types, such as non-governmental, public interest and governmental.
3.50
conveyance
physical instrument of international trade that transports goods (3.98) from one location to another
EXAMPLE Box, pallet, cargo transport unit (3.32), cargo handling equipment, truck, ship, aircraft, railcar.
3.51
cooperation
process of working or acting together for common interests and values based on agreement
Note 1 to entry: The organizations (3.158) agree by contract or by other arrangements to contribute with their
resources (3.193) to the incident response (3.115) but keep independence concerning their internal hierarchical
structure.
3.52
coordination
way in which different organizations (3.158) (public or private) or parts of the same organization work
or act together in order to achieve a common objective (3.153)
Note 1 to entry: Coordination integrates the individual response activities (3.1) of involved parties (including,
for example, public or private organizations and government) to achieve synergy to the extent that the incident
response (3.115) has a unified objective and coordinates activities through transparent information (3.116)
sharing regarding their respective incident response activities.
Note 2 to entry: All organizations are involved in the process (3.180) to agree on a common incident response
objective and accept to implement the strategies by this consensus decision-making process.
3.53
correction
action to eliminate a detected nonconformity (3.149)
[SOURCE: ISO 9000:2015, 3.12.3, modified —Notes 1 and 2 to entry have been deleted.]
3.54
corrective action
action to eliminate the cause of a nonconformity (3.149) and to prevent recurrence
Note 1 to entry: In the case of other undesirable outcomes, action is necessary to minimize or eliminate causes
and to reduce impact (3.107) or prevent recurrence. Such actions fall outside the concept of “corrective action” in
the sense of this definition.
[SOURCE: ISO 9000:2015, 3.12.2, modified — Note 1 to entry has been replaced and Notes 2 and 3 to
entry have been deleted.]
3.55
counterfeit
simulate, reproduce or modify a material good (3.139) or its packaging without authorization
3.56
counterfeit good
material good (3.139) imitating or copying an authentic material good (3.15)
ISO 22300:2018(E)
3.57
countermeasure
action taken to lower the likelihood (3.133) of a security threat scenario (3.241) succeeding in its
objectives (3.153), or to reduce the likely consequences (3.46) of a security threat scenario
3.58
covert authentication element
authentication element (3.17) that is generally hidden from the human senses and can be revealed by an
informed person using a tool or by automated interpretation (3.23)
3.59
crisis
unstable condition involving an impending abrupt or significant change that requires urgent attention
and action to protect life, assets (3.10), property or the environment
3.60
crisis management
holistic management (3.135) process (3.180) that identifies potential impacts (3.107) that threaten an
organization (3.158) and provides a framework for building resilience (3.192), with the capability for
an effective response that safeguards the interests of the organization’s key interested parties (3.124),
reputation, brand and value-creating activities (3.1), as well as effectively restoring operational
capabilities
Note 1 to entry: Crisis management also involves the management of preparedness (3.172), mitigation (3.146)
response, and continuity (3.49) or recovery (3.187) in the event of an incident (3.111), as well as management
of the overall programme through training (3.265), rehearsals and reviews (3.197) to ensure the preparedness,
response and continuity plans stay current and up-to-date.
3.61
crisis management team
group of individuals functionally responsible for directing the development and execution of the
response and operational continuity (3.49) plan, declaring an operational disruption (3.70) or emergency
(3.77)/crisis (3.59) situation, and providing direction during the recovery (3.187) process (3.180), both
pre-and post-disruptive incident (3.111)
Note 1 to entry: The crisis management team (3.61) can include individuals from the organization (3.158) as well
as immediate and first responders, and interested parties (3.124).
3.62
critical control point
CCP
point, step or process (3.180) at which controls can be applied and a threat (3.259) or hazard (3.99) can
be prevented, eliminated or reduced to acceptable levels
3.63
critical customer
entity (3.79), the loss of whose business would threaten the survival of an organization (3.158)
3.64
critical product or service
resource (3.193) obtained from a supplier which, if unavailable, would disrupt an organization’s (3.158)
critical activities (3.1) and threaten its survival
Note 1 to entry: Critical products or services are essential resources to support an organization’s high priority
activities and processes (3.180) identified in its business impact analysis (BIA).
3.65
critical supplier
provider of critical products or services (3.64)
Note 1 to entry: This includes an “internal supplier”, who is part of the same organization (3.158) as its customer.
8 © ISO 2018 – All rights reserved
ISO 22300:2018(E)
3.66
criticality analysis
process (3.180) designed to systematically identify and evaluate an organization’s (3.158) assets (3.10)
based on the importance of its mission or function, the group of people at risk (3.166), or the significance
of an undesirable event (3.268) or disruption (3.70) on its ability to meet expectations
3.67
custodian copy
duplicate that is subordinate to the authoritative source (3.21)
3.68
custody
period of time where an organization in the supply chain (3.159) is directly controlling the manufacturing,
handling, processing and transportation of goods (3.98) and their related shipping information (3.116)
within the supply chain (3.251)
3.69
disaster
situation where widespread human, material, economic or environmental losses have occurred which
exceeded the ability of the affected organization (3.158), community (3.42) or society to respond and
recover using its own resources (3.193)
3.70
disruption
event (3.82), whether anticipated (e.g. a labour strike or hurricane) or unanticipated (e.g. a blackout or
earthquake), that causes an unplanned, negative deviation from the expected delivery of products or
services (3.181) according to an organization’s (3.158) objectives (3.153)
3.71
document
information (3.116) and the medium on which it is contained
Note 1 to entry: The medium can be paper, magnetic, electronic or optical computer disc, photograph or master
sample, or a combination thereof.
Note 2 to entry: A set of documents, for example specifications and records (3.186), is frequently called
“documentation”.
[SOURCE: ISO 9000:2015, 3.8.5, modified — The example and Note 3 to entry has been deleted.]
3.72
documented information
information (3.116) required to be controlled and maintained by an organization (3.158) and the
medium on which it is contained
Note 1 to entry: Documented information can be in any format and media and from any source.
Note 2 to entry: Documented information can refer to:
— the management system (3.137), including related processes (3.180);
— information created in order for the organization to operate (documentation);
— evidence of results achieved (records (3.186)).
[SOURCE: ISO 9000:2015, 3.8.6, modified — Note 3 to entry has been deleted.]
3.73
downstream
handling, processing and movement of goods (3.98) when they are no longer in the custody (3.68) of the
organization in the supply chain (3.159)
ISO 22300:2018(E)
3.74
drill
activity (3.1) which practises a particular skill and often involves repeating the same thing several times
EXAMPLE A fire drill to practise safely evacuating a building on fire.
3.75
dynamic metadata
information (3.116) associated with a digital image aside from the pixel values that can change for each
frame of a video sequence
3.76
effectiveness
extent to which planned activities (3.1) are realized and planned results achieved
[SOURCE: ISO 9000:2015, 3.7.11, modified — Note 1 to entry has been deleted.]
3.77
emergency
sudden, urgent, usually unexpected occurrence or event (3.82) requiring immediate action
Note 1 to entry: An emergency is usually a disruption (3.70) or condition that can often be anticipated or prepared
for, but seldom exactly foreseen.
3.78
emergency management
overall approach for preventing emergencies (3.77) and managing those that occur
Note 1 to entry: In general, emergency management utilizes a risk management (3.208) approach to prevention
(3.173), preparedness (3.172), response and recovery (3.187) before, during and after potentially destabilizing
events (3.82) and/or disruptions (3.70).
3.79
entity
something that has a separate and distinct existence and that can be identified within context
Note 1 to entry: An entity can be a human, organization (3.158), physical object (3.151), class of objects or
intangible object.
3.80
evacuation
organized, phased and supervised dispersal of people from dangerous or potentially dangerous areas
to places of safety
3.81
evaluation
systematic process (3.180) that compares the result of measurement (3.143) to recognised criteria to
determine the discrepancies between intended and actual performance (3.167)
Note 1 to entry: Gaps in performance are inputs into the continual improvement (3.48) process.
3.82
event
occurrence or change of a particular set of circumstances
Note 1 to entry: An event can be one or more occurrences, and can have several causes.
Note 2 to entry: An event can consist of something not happening.
Note 3 to entry: An event can sometimes be referred to as an incident (3.111) or “accident”.
Note 4 to entry: An event without consequences (3.46) can also be referred to as a “near miss”, “incident”, “near
hit” or “close call”.
10 © ISO 2018 – All rights reserved
ISO 22300:2018(E)
Note 5 to entry: The nature, likelihood (3.133), and consequence of an event cannot be fully knowable.
Note 6 to entry: Likelihood associated with the event can be determined.
Note 7 to entry: An event can consist of a non-occurrence of one or more circumstances.
Note 8 to entry: An event with a consequence is sometimes referred to as an incident.
[SOURCE: ISO/Guide 73:2009, 3.5.1.3, modified — Notes 5 to 8 to entry have been added.]
3.83
exercise
process (3.180) to train for, assess, practise and improve performance (3.167) in an organization (3.158)
Note 1 to entry: Exercises can be used for validating policies, plans, procedures (3.179), training (3.265),
equipment, and inter-organizational agreements; clarifying and training personnel (3.169) in roles and
responsibilities; improving inter-organizational coordination (3.52) and communications; identifying gaps
in resources (3.193); improving individual performance and identifying opportunities for improvement; and a
controlled opportunity to practise improvisation.
Note 2 to entry: See also test (3.257).
3.84
exercise annual plan
document (3.71) in which the exercise (3.83) policy (3.171) plan has been translated to exercise goals
and exercises, and in which an exercise programme (3.86) for a certain year is reflected
3.85
exercise coordinator
person responsible for planning (3.170), conducting and evaluating exercise (3.83) activities
Note 1 to entry: In larger exercises, this function may include several people/staff and may be called “exercise
control”.
Note 2 to entry: Some countries use a term such as “exercise director” or similar instead of “exercise coordinator”.
Note 3 to entry: The exercise coordinator role is also responsible for the cooperation (3.51) among internal and
external entities.
3.86
exercise programme
series of exercise (3.83) activities designed to meet an overall objective (3.153) or goal
3.87
exercise programme manager
person responsible for planning (3.170) and improving the exercise programme (3.86)
3.88
exercise project team
group of individuals responsible for planning (3.170), conducting and evaluating an exercise (3.83) project
3.89
exercise safety officer
person tasked with ensuring that any actions during the exercise (3.83) are performed safely
Note 1 to entry: In larger exercises, involving multiple functions, more than one safety officer may be assigned.
3.90
facility
plant, machinery, property, buildings, transportation units, sea/land/air ports and other items of
infrastructure (3.117) or plant and related systems that have a distinct and quantifiable business
function or service
ISO 22300:2018(E)
3.91
false acceptance rate
proportion of authentications (3.16) wrongly declared true
3.92
false rejection rate
proportion of authentications (3.16) wrongly declared false
3.93
forensic
related to, or used in, courts of law
Note 1 to entry: This applies to video-surveillance used to produce legal evidence.
3.94
forensic analysis
scientific methodology for authenticating material goods (3.139) by confirming an authentication
element (3.17) or an intrinsic attribute through the use of specialized equipment by a skilled expert
with special knowledge
3.95
full-scale exercise
exercise (3.83) which involves multiple organizations (3.158) or functions and includes actual
activities (3.1)
3.96
functional exercise
exercise (3.83) to train for, assess, practise and improve the performance (3.167) of single functions
designed to respond to and recover from an unwanted event (3.82)
Note 1 to entry: Functions can include an emergency operations centre (EOC) team, a crisis management team
(3.61) or fire-fighters decontaminating mock victims.
3.97
geo-location
specific location defined by one of several means to represent latitude, longitude, elevation above sea
level and coordinate system
Note 1 to entry: Geo-location generally means the meaningful specification of the position of a point or object
(3.151) on the earth. The term itself does not carry a prescription of the coordinate system to be used. Additional
attributes associated with a geo-location are not a part of a geo-location specification.
3.98
goods
items or materials that, upon the placement of a purchase order, are manufactured, handled, processed
or transported within the supply chain (3.251) for usage or consumption by the purchaser
3.99
hazard
source of potential harm
Note 1 to entry: Hazard can be a risk source (3.213).
[SOURCE: ISO/Guide 73:2009, 3.5.1.4]
3.100
hazard monitoring function
activities (3.1) to obtain evidence-based information (3.116) on hazards (3.99) in a defined area used to
make decisions about the need for public warning (3.183)
12 © ISO 2018 – All rights reserved
ISO 22300:2018(E)
3.101
hue
attribute of a visual sensation where an area appears to be similar to one of the perceived colours, red,
yellow, green, and blue, or to a combination of two of them
3.102
human interpretation
authenticity as evaluated by an inspector (3.120)
3.103
human rights risk analysis
HRRA
process (3.180) to identify, analyse, evaluate and document human rights-related risks (3.199) and their
impacts (3.107), in order to manage risk and to mitigate or prevent adverse human rights impacts and
legal infractions
Note 1 to entry: The HRRA is part of the organization’s (3.158) requirement (3.190) to undertake human rights
due diligence to identify, prevent, mitigate and account for how it addresses impacts on human rights.
Note 2 to entry: The HRRA is framed by relevant international human rights principles and conventions and
forms a fundamental part of the organization’s overall risk assessment (3.203).
Note 3 to entry: The HRRA includes an analysis of the severity of actual and potential human rights impacts
that the organization may cause or contribute to through its security operations (3.232), or which may be linked
directly to the organization’s operations, projects or services through its business relationships. The HRRA
process should include consideration of the operational context, draw on the necessary human rights expertise,
and involve direct, meaningful engagement with those interested parties (3.124) whose rights may be at risk.
Note 4 to entry: The analysis of the consequences (3.46) of adverse human rights impacts are measured and
prioritized in terms of the severity of the impacts.
Note 5 to entry: HRRAs should be undertaken at regular intervals, recognizing that human rights risks may
change over time.
Note 6 to entry: HRRAs will vary in complexity with the size of the organization, the risk of severe human rights
impacts and the nature and context of its operations.
Note 7 to entry: HRRA is sometimes referred to as a “human rights risk assessment”, a “human rights impact
assessment” or a “human rights risk and impact assessment”.
3.104
identification
process (3.180) of recognizing the attributes that identify an entity (3.79)
3.105
identifier
specified set of attributes assigned to an entity (3.79) for the purpose of identification (3.104)
3.106
identity
set of attributes that are related to an entity (3.79)
Note 1 to entry: An identity can have unique attributes that enable an object (3.151) to be distinguished from
all others.
Note 2 to entry: Identity can be viewed in terms of human, organization (3.158) and objects (physical and
intangible).
3.107
impact
evaluated consequence (3.46) of a particular outcome
ISO 22300:2018(E)
3.108
impact analysis
consequence analysis
process (3.180) of analysing all operational functions and the effect that an operational interruption
can have upon them
Note 1 to entry: Impact analysis is part of the risk assessment (3.203) process and includes business impact analysis
(3.29). Impact analysis identifies how the loss or damage will manifest itself; the degree for potential escalation
of damage or loss with time following an incident (3.111); the minimum services and resources (human, physical,
and financial) needed to enable business processes to continue to operate at a minimum acceptable level; and
the timeframe and extent within which activities (3.1), functions and services of the organization should be
recovered.
3.109
impartiality
actual or perceived presence of objectivity
Note 1 to entry: Objectivity means that conflicts of interest do not exist or are resolved so as not to adversely
influence subsequent activities.
Note 2 to entry: Other terms commonly used to convey the element of impartiality are objectivity, independence,
freedom from conflict of interests, freedom from bias, lack of prejudice, neutrality, fairness, open-mindedness,
even-handedness, detachment and balance.
3.110
improvisation
act of inventing, composing or performing, with little or no preparation, a reaction to the unexpected
3.111
incident
situation that can be, or could lead to, a disruption (3.70), loss, emergency (3.77) or crisis (3.59)
3.112
incident command
process that is conducted as part of an incident management system (3.137), and which evolves during
the management (3.135) of an incident (3.111)
3.113
incident management system
system that defines the roles and responsibilities of personnel (3.169) and the operating procedures
(3.179) to be used in the management of incidents
3.114
incident preparedness
activities (3.1) taken to prepare for incident response (3.115)
3.115
incident response
actions taken in order to stop the causes of an imminent hazard (3.99) and/or mitigate the consequences
(3.46) of potentially destabilizing events (3.82) or disruptions (3.70), and to recover to a normal situation
Note 1 to entry: Incident response is part of the emergency management (3.78) process (3.180).
3.116
information
d
...





Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...