{"id":1613,"date":"2025-07-22T18:35:28","date_gmt":"2025-07-22T14:35:28","guid":{"rendered":"https:\/\/cyberforensics.az\/?page_id=1613"},"modified":"2025-07-22T18:36:41","modified_gmt":"2025-07-22T14:36:41","slug":"iso-iec-20000-12018","status":"publish","type":"page","link":"https:\/\/cyberforensics.az\/az\/iso-iec-20000-12018\/","title":{"rendered":"ISO\/IEC 20000-1:2018"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1613\" class=\"elementor elementor-1613\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ef6efd2 e-flex e-con-boxed e-con e-parent\" data-id=\"1ef6efd2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1ab8f383 e-flex e-con-boxed e-con e-parent\" data-id=\"1ab8f383\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d1ca52a elementor-widget elementor-widget-spacer\" data-id=\"d1ca52a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4830109 e-flex e-con-boxed e-con e-parent\" data-id=\"4830109\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6fd93b60 e-flex e-con-boxed e-con e-parent\" data-id=\"6fd93b60\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-637c7db5 elementor-widget elementor-widget-text-editor\" data-id=\"637c7db5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"stdTitle\"><span class=\"h4 fw-normal d-block mb-2\">\u0130nformasiya texnologiyalar\u0131 \u2014 Xidm\u0259tin idar\u0259 edilm\u0259si<\/span><span class=\"h4 fw-semibold d-block\">Hiss\u0259 1: Xidm\u0259tin idar\u0259 edilm\u0259si sistemi t\u0259l\u0259bl\u0259ri<\/span><\/p><div class=\"d-flex justify-content-between align-items-center\"><h2>Abstract<\/h2><\/div><div><p>This document specifies requirements for an organization to establish, implement, maintain and continually improve a service management system (SMS). The requirements specified in this document include the planning, design, transition, delivery and improvement of services to meet the service requirements and deliver value. This document can be used by:<\/p><p>a) a customer seeking services and requiring assurance regarding the quality of those services;<\/p><p>b) a customer requiring a consistent approach to the service lifecycle by all its service providers, including those in a supply chain;<\/p><p>c) an organization to demonstrate its capability for the planning, design, transition, delivery and improvement of services;<\/p><p>d) an organization to monitor, measure and review its SMS and the services;<\/p><p>e) an organization to improve the planning, design, transition, delivery and improvement of services through effective implementation and operation of an SMS;<\/p><p>f) an organization or other party performing conformity assessments against the requirements specified in this document;<\/p><p>g) a provider of training or advice in service management.<\/p><p>The term &#8220;service&#8221; as used in this document refers to the service or services in the scope of the SMS. The term &#8220;organization&#8221; as used in this document refers to the organization in the scope of the SMS that manages and delivers services to customers. The organization in the scope of the SMS can be part of a larger organization, for example, a department of a large corporation. An organization or part of an organization that manages and delivers a service or services to internal or external customers can also be known as a service provider. Any use of the terms &#8220;service&#8221; or &#8220;organization&#8221; with a different intent is distinguished clearly in this document.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4ddd3434 e-flex e-con-boxed e-con e-parent\" data-id=\"4ddd3434\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4020d865 elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation\" data-id=\"4020d865\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\" role=\"navigation\" aria-label=\"Post Navigation\">\r\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\r\n\t\t\t\t<a href=\"https:\/\/cyberforensics.az\/az\/elementor-page-1604\/\" rel=\"prev\"><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-prev\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-left\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z\"><\/path><\/svg><span class=\"elementor-screen-only\">Prev<\/span><\/span><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">\u018fvv\u0259lki<\/span><span class=\"post-navigation__prev--title\">ISO\/IEC 27031:2025<\/span><\/span><\/a>\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation__separator-wrapper\">\r\n\t\t\t\t\t<div class=\"elementor-post-navigation__separator\"><\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\r\n\t\t\t\t<a href=\"https:\/\/cyberforensics.az\/az\/elementor-page-1619\/\" rel=\"next\"><span class=\"elementor-post-navigation__link__next\"><span class=\"post-navigation__next--label\">Sonrak\u0131<\/span><span class=\"post-navigation__next--title\">ISO\/IEC\/IEEE 24748-1:2024<\/span><\/span><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-next\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><span class=\"elementor-screen-only\">Sonrak\u0131<\/span><\/span><\/a>\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>ISO\/IEC 20000-1:2018 Information technology \u2014 Service managementPart 1: Service management system requirements Abstract This document specifies requirements for an organization to establish, implement, maintain and continually improve a service management system (SMS). The requirements specified in this document include the planning, design, transition, delivery and improvement of services to meet the service requirements and deliver [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1613","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/pages\/1613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/comments?post=1613"}],"version-history":[{"count":0,"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/pages\/1613\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyberforensics.az\/az\/wp-json\/wp\/v2\/media?parent=1613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}