Search results for "iso17025 vs gmp"

Guest

Guest

Create New Topic As guest or Sign in

HTML tags are not allowed

Assign topic to the user

  • Data controllers

    ... ontroller vs. processor – What are the differences? : https://advisera.com/eugdpracademy/knowledgebase/eu-gdpr-controller-vs-processor-what-are-the-differences/

  • EU GDPR Foundations Course: https://advisera.com/training/eu-gdpr-foundations-course/
  • EU GDPR Data Protection Officer Course: https://advisera.com/training/eu-gdpr-data-protection-officer-course/
  • Guidelines 07/2020 on the concepts of controller and processor in the GDPR: https://edpb.europa.eu/our-work-tools/our-documents/guidelines/guidelines-072020-concepts-controller-and-processor-gdpr_en
  • ISO 27001 Integration

    ... i>PCI-DSS vs. ISO 27001 Part 1 – Similarities and Differences https://advisera.com/27001academy/knowledgebase/pci-dss/

  • PCI-DSS vs. ISO 27001 Part 2 – Implementation and Certification https://advisera.com/27001academy/knowledgebase/pci-dss/
  • This material will also help you regarding ISO 27001 implementation:

    This article from ISACA can provide you with a comparison between ISO 27001 and PCI DSS: https://www.isaca.org/resources/isaca-journal/issues/2016/volume-1/comparison-of-pci-dss-and-isoiec-27001-standards

  • UKAS Accreditation

    All accreditation bodies need to be compliant with ISO 17011, the standard which defines the process of accreditation, so there is no such thing as a lesser certification. It is more a question of market preference or legal requirement (e.g., a law, regulation, or contract may require a specific accreditation body).  

    For further information, see:

  • Questions around templates - policies vs procedures

    We have a question around the policies vs procedures. Example: In the template ”Security Procedures for IT-department” under Change Management procedures, you have a comment saying: ”Delete if the change management policy constitutes a separate document”. Shouldn’t the Change management policy and the Change management procedure be separate documents/have separate purposes (the why and the how).
    1. From your templates it seems like policies and procedures could be the same thing, since we don't need a change management policy if we include this as a procedure in the document Security Procedures for IT department?
    2. Is it okay to only have procedures or policies for certain controls?
  • Extended Manufacturing Site

    Extended üretim sahası kuralları için IATF Rules revizyon 5, Annex 4’ü gözden geçirmenizi tavsiye ederim. 

    Özellikle extended manufacturing site için; ‘’ özerk karar vermeme yetkisine sahip olmamak’’ önemlidir ve ana üretim sahasına bağlı olmalıdır. 

    Bir çok ana aktivite; üst yöntim, kalite yönetim, vb gibi konular; ana saha tarafından yürütülmelidir.  

    Hatta, extended manufacturing site’da; sadece üretim, kalite gibi operatörlerin olmasıda isteniyor olabilir. 

    Bunun haricinde belgelendirme şirketiniz ile de görüşmenizi tavsiye ederim. 

  • Advise on Project timelines for ISO 27001 Certification

    ... restart after we have resubmitted the evidence that proves we have corrected it.

    The certification audit is not resumed after the nonconformity is corrected. The auditor will verify if the nonconformity is resolved (after the official part of the certification audit is completed) and the evidence is sent to him.

    For further information, see:

  • Video of A17 (ISO 27001 lead implementer course)

    The IT disaster recovery refers to point 4 – Redundancies, which is covered by controls A.17.1.2 - Implementing information security continuity, and A.17.2.1 - Availability of information processing facilities.

    This article will provide you a further explanation about Disaster Recovery:

  • NIST 800-53 vs ISO 27001

    I will like to know which is a better framework for financial organisations - nist 800-53 or iso 27001
  • Questions about Stage 1, and Scope

    ... support" vs "The operation of information systems that support"

    Please note that when you refer to "The information systems that support", all personnel who interacts with the information systems needs to be included in the scope (e.g., IT personnel, users, customers, etc.).

    When you refer to "The operation of information systems that support", you limit the personnel who interacts with the information systems to the people who keep them running, i.e., the IT staff.

  • ISO 27001 lead auditor

    Please note that accreditation applies only to organizations that want to become certification bodies, i.e., organizations that can certify other organizations against a standard, like ISO 9001.

    So, the statement is incorrect, because in that context the business should become certified not accredited.

    For further information, see:

Page 16 of 122 pages

Didn’t find an answer?

Start a new topic and get direct answers from the Expert Advice Community.

CREATE NEW TOPIC +