March 2026: New Standards Transform Security and IoT in Information Technology

March 2026 Information Technology Standards: Security, IoT, and Electronic Fee Collection Innovations
The Information Technology sector continues its rapid evolution this March 2026, with five significant new standards published to guide secure operations, innovative RFID deployments, and practical application of IoT in healthcare. These updates address everything from advanced cryptographic testing methods to home healthcare IoT frameworks—providing vital tools for safeguarding digital transactions, ensuring end-to-end conformance, and unleashing the potential of connected technologies for both business and society.
Overview / Introduction
Information Technology and Office Equipment are at the core of today's digital world. Standards in this domain are crucial for:
- Ensuring cybersecurity and data integrity
- Enabling interoperability among diverse solutions
- Enhancing operational efficiency and user trust
- Accelerating adoption of new technologies across sectors
This article provides a focused review of five newly published international standards. Readers will gain practical insights into:
- Electronic fee collection device personalization
- Crypto suite testing for RFID tags and interrogators
- IoT architectural guidance for home healthcare
- Best practices for security and interoperability
- How these standards affect compliance and procurement
Detailed Standards Coverage
ISO 21719-1:2026 - Electronic Fee Collection Personalization Framework
Electronic fee collection — Personalization of on-board equipment (OBE) — Part 1: Framework
ISO 21719-1:2026 offers a comprehensive framework for the personalization of on-board equipment (OBE) used in electronic fee collection (EFC) systems. Personalization ensures that tolling devices are securely and accurately assigned to vehicles and users, supporting applications like road charging, tolling, and compliance monitoring.
Key aspects of this standard include a clear definition of the personalization process and its assets (user data, application keys, vehicle data), as well as an architectural overview that ensures consistency across various hardware and communication media (e.g., smart cards, DSRC). The framework enables toll service providers and personalization agents to adopt common methods, improving interoperability and ease of outsourcing.
This document specifically standardizes the interface between personalization equipment (PE) and the OBE, while subsequent parts in the ISO 21719 series cover detailed communication protocols and implementation.
Key highlights:
- Defines the required steps and security considerations for EFC personalization
- Promotes interoperability and outsourced personalization service models
- Sets the foundation for future-proof, cross-border tolling solutions
Access the full standard:View ISO 21719-1:2026 on iTeh Standards
ISO/IEC 19823-16:2026 - Conformance Test Methods for ECDSA-ECDH Crypto Suite
Information technology — Conformance test methods for security service crypto suites — Part 16: Crypto suite ECDSA-ECDH
ISO/IEC 19823-16:2026 establishes standardized conformance test methods for devices using the ECDSA (Elliptic Curve Digital Signature Algorithm) and ECDH (Elliptic Curve Diffie-Hellman) cryptographic suites, as defined in ISO/IEC 29167-16. These are vital for RFID-based systems requiring high assurance in authentication and confidentiality, particularly in supply chain, transport, or access control applications.
The standard covers:
- Testing protocols for both mandatory and optional cryptographic features
- Environmental and operational setup (temperature, humidity, etc.)
- Demonstration and design assessments by ISO/IEC 17025-accredited labs
- Specific test patterns illustrating edge cases and interoperability
Applicable to RFID tags and interrogators conforming to the ISO/IEC 18000 series, this standard is a must for vendors and integrators aiming to validate strong crypto implementations and demonstrate compliance in security audits.
Key highlights:
- Robust test protocols for ECDSA-ECDH cryptographic suites
- Standardizes both demonstration and analytical (by-design) testing
- Addresses update of command codes and normative references
Access the full standard:View ISO/IEC 19823-16:2026 on iTeh Standards
ISO/IEC TR 30123:2026 - IoT Guidance for Home Healthcare
Internet of Things (IoT) — Guidance on IoT application to home healthcare
ISO/IEC TR 30123:2026 answers one of today’s most pressing needs: secure, reliable, and patient-centric IoT integration in home healthcare settings. The technical report delivers practical guidance addressing:
- Confidentiality, reliability, and safety in connected health device deployments
- System architecture models for seamless integration across home, clinical, and cloud domains
- Operation processes including device installation, user-defined routines, data analytics, and integration of AI for personalized care
The report highlights best practices, use case illustrations (e.g., sleep quality improvement routines), and privacy-by-design strategies to mitigate risks from unauthorized access or data breaches. It is essential for device manufacturers, digital health integrators, and healthcare providers embarking on IoT-driven transformation.
Key highlights:
- Comprehensive mapping of IoT requirements for home healthcare
- Stepwise implementation guidance and compliance considerations
- Includes safety, accuracy, and context-awareness best practices
Access the full standard:View ISO/IEC TR 30123:2026 on iTeh Standards
ISO/IEC 19823-10:2026 - Conformance Test Methods for AES-128 Crypto Suite
Information technology — Conformance test methods for security service crypto suites — Part 10: Crypto suite AES-128
ISO/IEC 19823-10:2026 specifies test methods to validate implementations of the AES-128 cryptographic suite under ISO/IEC 29167-10. AES-128 is widely recognized for its strength and efficiency in encrypting sensitive item data in RFID systems—powering everything from access keys in smart buildings to security tags in supply chain and retail.
Key requirements outlined in this standard include:
- Detailed conformance test maps for both required and optional features
- Environmental and pre-conditioning testing parameters
- Methods for both demonstration (lab-based) and design-based conformance validation
The standard closely aligns with RFID protocols ISO/IEC 15693 and ISO/IEC 18000, ensuring direct applicability for solution integrators and manufacturers needing certified, secure credential management.
Key highlights:
- End-to-end test methodologies for AES-128 crypto suite compliance
- Guidance for both laboratory and analytical validation
- Supports rigorous, repeatable RFID security certification processes
Access the full standard:View ISO/IEC 19823-10:2026 on iTeh Standards
ISO/IEC 19823-13:2026 - Conformance Test Methods for Grain-128A Crypto Suite
Information technology — Conformance test methods for security service crypto suites — Part 13: Crypto suite Grain-128A
ISO/IEC 19823-13:2026 provides a unified set of conformance test procedures for the Grain-128A stream cipher—that is, for ultra-lightweight yet robust cryptography in resource-constrained RFID systems. With its expanded suite of test patterns and updated over-the-air protocol alignment, this standard ensures that security implementations can be reliably validated for both basic and advanced feature sets.
Requirements span:
- Test plan creation for all required and selectable options
- Lab demonstration protocols for real-world performance confirmation
- Compliance with the wider ISO/IEC 18000 and 29167-13 frameworks
The result: a well-defined process for manufacturers and solution providers to certify their security modules, reducing vulnerabilities and enhancing user trust in next-gen RFID deployments.
Key highlights:
- Comprehensive test coverage for the Grain-128A cryptographic suite
- Incorporated updates to protocol and optional features
- Tailored for high-scale, low-power RFID environments
Access the full standard:View ISO/IEC 19823-13:2026 on iTeh Standards
Industry Impact & Compliance
The March 2026 information technology standards collectively:
- Strengthen the global digital ecosystem with robust crypto validation and interoperability
- Foster safer and more scalable electronic fee collection, enabling cross-border mobility
- Equip the healthcare sector with trusted IoT frameworks for efficient remote care
Compliance considerations:
- Early adoption can boost competitive advantage, particularly for organizations bidding on international contracts or government tenders
- Non-compliance may result in higher security risks, interoperability issues, or exclusion from regulated markets
- Certification using accredited labs and conformance procedures is strongly advised
Benefits of adoption:
- Simplified procurement for compliant products
- Reduced vulnerability to cyber threats and data breaches
- Streamlined integration and lifecycle management of IT solutions
Timelines:
- Most standards published March 2026 are effective immediately, with implementation driven by industry sector requirements and local regulation
Technical Insights
Common threads across the five standards include:
- Emphasis on robust, repeatable testing methods—whether for personalization, interoperability, or cryptographic soundness
- Defined processes for both laboratory demonstration and by-design analysis to prove compliance
- Focus on data confidentiality, integrity, and secure key management
- Architecture models supporting modular integration and future scalability
Implementation best practices:
- Establish compliance monitoring early in system development
- Engage with ISO/IEC 17025-accredited test laboratories for certification
- Integrate security-by-design and privacy-by-design principles, especially in healthcare and mobility sectors
- Stay aligned with referenced base standards (e.g., ISO/IEC 18000 series)
Testing and certification considerations:
- Prepare both protocol and functionality documentation for conformance testing
- Develop testable user stories for complex implementations (e.g., multi-service OBE)
- Map out compliance dependencies, particularly in multi-vendor environments
Conclusion / Next Steps
March 2026 marks a substantial leap forward in standardizing information technology security, interoperability, and IoT integration. Organizations should:
- Review relevant standards in full and prioritize alignment based on business risks and requirements
- Ensure cross-departmental awareness (IT, procurement, compliance, engineering)
- Consider external certification for mission-critical systems and products
- Stay informed about future parts and revisions in these series via the iTeh Standards platform
Stay ahead: Access the complete library of international IT standards and receive the latest updates from authoritative sources on iTeh Standards.
Categories
- Latest News
- New Arrivals
- Generalities
- Services and Management
- Natural Sciences
- Health Care
- Environment
- Metrology and Measurement
- Testing
- Mechanical Systems
- Fluid Systems
- Manufacturing
- Energy and Heat
- Electrical Engineering
- Electronics
- Telecommunications
- Information Technology
- Image Technology
- Precision Mechanics
- Road Vehicles
- Railway Engineering
- Shipbuilding
- Aircraft and Space
- Materials Handling
- Packaging
- Textile and Leather
- Clothing
- Agriculture
- Food technology
- Chemical Technology
- Mining and Minerals
- Petroleum
- Metallurgy
- Wood technology
- Glass and Ceramics
- Rubber and Plastics
- Paper Technology
- Paint Industries
- Construction
- Civil Engineering
- Military Engineering
- Entertainment