Solved

Universal Standard for name and address data

Posted on 2013-05-15
5
520 Views
Last Modified: 2013-11-13
Can somebody recommend a simple and effective standard (universal - international - ISO?) for holding names and address details in data (database/column based file).

Thanks

Carl.
0
Comment
Question by:Carl Sudholz
  • 3
  • 2
5 Comments
 
LVL 74

Assisted Solution

by:Jeffrey Coachman
Jeffrey Coachman earned 100 total points
ID: 39170461
Not sure what you mean here...but something like this would be fairly standard...


Table Name: Customers
Fields:
cID (Primary Key, AutoNumber)
cFName (Text)
cLName (Text)
cMiddleInit (Text)
cAddress( Text)
cAddress2 (Text)
cCity (Text)
cStateOrProvince (Text)
cPostalCode (Text)
cCountry (Text)


JeffCoachman
0
 

Author Comment

by:Carl Sudholz
ID: 39170464
Thanks Jeff,

Yes that is very close to what I do now.  However, I was looking for an officially recognized Standard for personal details management - such as one by the International Organization for Standardization (ISO), or some similarly recognized Government or industry body.

My searching thus far has come up blank.
0
 
LVL 74

Accepted Solution

by:
Jeffrey Coachman earned 100 total points
ID: 39170469
I don't think there is such a thing...
But if you are really into this sort of thing see this link:
http://www.isotc211.org/address/docs/Draft_ISO19160-1_20111208.pdf



Note that this is a very broad topic...

You can get into things like TitleOfCourtesy, Email, Phone, ...etc
...That would technically require related tables...
0
 

Author Comment

by:Carl Sudholz
ID: 39170522
Thanks, that is closer to what I am after and I am aware of the complexities of the topic.  

I just thought someone would have come up with a simple and standard data dictionary for such commonly required data.
0
 

Author Comment

by:Carl Sudholz
ID: 39337992
Thanks team.
0

Featured Post

Secure Your Active Directory - April 20, 2017

Active Directory plays a critical role in your company’s IT infrastructure and keeping it secure in today’s hacker-infested world is a must.
Microsoft published 300+ pages of guidance, but who has the time, money, and resources to implement? Register now to find an easier way.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question