The best way to address this nonconformity is to conduct analysis of your product life-cycle in therms of environmental aspects in order to identify environmental aspects related to each phase of the product life-cycle, evaluate them, determine significant ones and apply operational controls to decrease the adverse impact on the environment.
Answer:
ISO 27001 defines that you need a methodology for the risk assessment (is a requirement), but does not defines what methodology you need to use, so you can use the methodology that you want. Generally most of the methodologies are based on assets, and it is our recommendation. If you want, you can develop your own methodology, and for this you can read this article “How to write ISO 27001 risk assessment methodology” : https://advisera.com/27001academy/knowledgebase/write-iso-27001-risk-assessment-methodology/
The process of implementation is the same for every company regardless of the type of business and processes.
First, you need to have the top management on board for this project, because without their support it would be impossible to implement the standard. Next step is to perform a GAP analysis in order to determine to which level your company is already compliant with the standard and what needs to be done to achieve the full compliance.
Then, it is the best to set up the implementation as a project, to clearly define all the tasks and responsibilities for the tasks as well as the deadlines. Once you create all necessary documents and implement the changes in your processes, you can conduct the internal audit and management review and then your company will be ready for certification audit.
Implementing ISO 9001:2015 in educational institution
Answer:
Since the organization is already ISO 9001:2008 certified, it doesn't need to implement the standard from scratch, it only need to make transition to the new version of the standard.
The transition process is the same for any kind of organization, since the standard itself if applicable to any type of organization. First step in transition is to perform a GAP analysis an determine to which level the organization is already compliant with a new version of the standard. The next step is to define all activities necessary to achieve the full compliance with ISO 9001:2015. Those activities include creation of documents, making changes to existing documents and processes and establishing new processes. Once every defined activity is executed, the organization need to conduct internal audit and management review and than the organization is ready for certification audit.
The FMEA is not the only method for identification and evaluation of risks in QMS, there are a lot of methods for risk assessment available, some of them are described in ISO 31010. There is no one single method that would fit all organizations and all issues related to the context of the organization, every methodology has it own limitations.
HIRARC is used in determining occupational health and safety risks, so the scope of the method is far from the requirements of the standard and that is to address risks and opportunities emerging form context of the organization that can affect ability of the QMS to achieve intended results, to enhance desirable results, prevent undesired effect and achieve the improvement. The only way to use this methodology is to modify it in a way that addresses the requirements of the standard.
Choosing the risk assessment methodology needs to be done carefully, because most of the methodolog ies do not identify opportunities which is also a requirement of the standard. Another important thing is that the standard does not require the methodology, so the process of addressing risks and opportunities can be done in much simpler manner that will ensure covering both risks and opportunities, for example using SWOT or PEST analysis.
Coding the documents during transition to ISO 9001:2015
Yes, exactly and also you need to add new management review inputs, such as :
- changes in external and internal issues that are relevant to the quality management system;
- the effectiveness of actions taken to address risks and opportunities
Changes in ISO 27001:2013 related to the scope, the context and the SOA
Answer:
To give you more specific help we would need more information about these NCs, anyway the main change, related to the scope, the context and the SOA in the new ISO 27001:2013, is the interested parties and the internal and external issues (basically there are no changes related to the scope and the SOA in the new version of the standard).
Answer:
I am sorry but I am not sure if I have understood your questions. You do not need to evaluate the risk owner, you simply need to identify the risk owner for each risk. This risk owner can be a person or entity with the accountability and authority to manage a risk. This article can help you to understand who can be a risk owner “Risk owners vs. Asset owners in ISO 27001:2013” : https://advisera.com/27001academy/knowledgebase/risk-owners-vs-asset-owners-in-iso-270012013/
By the way, the risk owner can also participate in the evaluation of risks, but can participate also others. And the formula for the calculation of the risk depends of the methodology of the risk management, but an example can be: Risk = Consequences + Likelihood. For more information about this, this free webinar can be interesting for you “The basics of risk assessment and treatment ac cording to ISO 27001” : https://advisera.com/27001academy/webinar/basics-risk-assessment-treatment-according-iso-27001-free-webinar-demand/
Answer:
Generally in the methodologies of risk assessment the identification and treatment of risks are made in the same way for all functional units. This is the easiest way and our recommendation, furthermore from my point of view perform a different risk assessment for different functional units has little sense, because all steps can be always the same: identity assets, identify threats/vulnerabilities, identify risks, etc
Remember that ISO 27001 has many security controls that are not directly related to IT, and this standard have been developed for the management of information security including the protection of information in Human resource, compliance, supplier relationships, etc.
Structure and communication between IS, Risks and IT
Answer:
I am sorry but I am not sure if I have understood your question. Anyway, if we see Information Security, Risks and IT as different process, from my point of view Risks and IT give support to Information Security, I mean, Risks and IT give information to Information Security (without this information the Information Security management is not possible).
With this structure, I think that the communication between these process is easy: Information Security requests information about risks, Risks identifies information security risks and the security controls that are necessary (this information can be coordinated directly with IT), Information Security receives the information and request IT for the implementation of information security controls.
Risks and IT can also give information to others process, for example Business Continuity Management, Quality Management, etc.
Finally, you can find in our Free Download section the white paper "Integration of Information Security, IT and Corporate Governance", that I think can be interesting for you : https://advisera.com/27001academy/free-downloads/