Start a new topic and get direct answers from the Expert Advice Community.
CREATE NEW TOPIC +Guest
Thank you for this. I am confused though. I realize that ethnicity is a "special category" of "personal data" but if we don't collect any PII (name, email, IP address, etc) then how is the data subject to exercise their rights for the erasure of the data? We have nothing to specifically identify the data record after the survey has been completed.
Unless your client has specific legal requirements (e.g., laws, regulations, or contracts) demanding a separated set of documentation, integrating common documents of both ISO 9001 and ISO 27001 is recommended, to avoid unnecessary duplicated documents (e.g., a procedure for document and record control, internal audit, etc.).
Regarding the integrated toolkit for ISO 9001 and ISO 27001, this one is not available, but you can use the documents referred to in the paper you downloaded as guidance.
These articles will provide you a further explanation about integrated systems:
This material will also help you regarding ISO 27001 and ISO 9001:
RTO (Recovery Time Objective) is defined based on how fast you want to resume your operations after a disruption, while RPO (Recovery Point Objective) is defined based on how much data you can afford to lose due to a disruption.
For example, if an application has an RTO of 1 day and an RPO of 4 hours, it means that this application can be recovered (resume normal operation) in one day, but the information from the last 4 hours before the interruption occurred will be lost.
Business Continuity strategies refer to high-level actions to be developed to achieve defined continuity objectives.
For example, to ensure the objective of recovering operations in a defined timeframe, the strategy adopted may be the use of an alternative site. Another example is a backup strategy (which could be incremental, differential, etc.).
Testing and exercising are activities performed to find what doesn’t work in your business continuity in a controlled situation. In other words, when you lack real incidents, you create simulated ones to be able to improve your plans.
These articles will provide you a further explanation about these concepts:
This material will also help you regarding business continuity:
HI, just following on from the webinar last week regarding the Certification Process - which was very good thank you – I’ve a couple of questions if that’s OK:
1 - Training / Awareness
Prior to the webinar we had been led to believe that our planned approach – namely:
Publish the IS policy & notify everyone it is available – but not actually record who has read it
Publish a number of awareness bulletins and encourage people to discuss them at team meetings
Run a small number of online sessions whereby information on various aspects of ISO 27001 / Information Security are presented. The attendee list for these events would be retained
would be sufficient. Would you agree with that or, as I think you implied would the auditor expect that we had a more formal approach to training with people being recorded against the training sessions they have completed?
Please note that while your proposed approaches cover the communication from organization to employees, you are not considering an approach to ensure employees have understood your message, i.e., that they understand the importance of information security, the impacts in case it is compromised, and what they can do to protect information.
So, you should also consider the application of small quizzes or other methods to evaluate employees' understanding.
For further information, see:
2 - Internal Auditor
Is it mandatory that the internal audit is carried out by a certified auditor (whether that’s an internal member of staff that’s been trained or a 3rd party retained for the audits)? One thought was that following the first initial audit where we would use a qualified third party we would compile questions that would need to be completed for subsequent audits. Selected people would then take those questions round the business at the appropriate time – though they would not necessarily be accredited.
Any information you can give would be greatly appreciated.
Thanks
You do not need a certified auditor to perform an internal audit, provided that you can evidence his audit competencies by other means, like previous experience, or formal education in an audit.
These articles will provide you a further explanation about internal auditor:
These materials will also help you regarding internal audit:
1 - In order to show evidence that ISMS has been implemented, must we show a minimum period of implementation? For example, 3 months?
This is different from one certification body to the other - some require you to have ISMS in full operation for at least 3 months, while others do not have such criteria. The best would be if you ask for proposals from a couple of certification bodies, and ask them this specific question.
These articles may also help you:
2 - What will the external auditor look out for in terms of actual implementation of the ISMS for ISO27001 certification? Please advise.
The certification auditor will look for all documents and records stated as mandatory by the standard, and those considered applicable by the organization (e.g., policies and procedures related to applied controls).
In the ISO world, mandatory requirements/documents are related to the words “must” or “shall”, while non-mandatory requirements/documents are related to the words “may” or “should”.
Documents and records mandatory to fulfill clauses from the main sections of the standard (sections 4 to 10) are:
These articles will provide you a further explanation about documents required for certification and the certification audit:
These materials will also help you regarding the certification process:
For organizations with up to 50 employees, the best approach is to include all the organizations in the ISMS scope, because in this situation in the majority of cases the effort to separate elements in the scope from those out of it is not worthy.
When the organization uses a third-party Platform-as-a-Service, the data and all application software should be included in the ISMS scope, while everything else is out, including all system software.
These articles will provide you a further explanation about scope definition:
These materials will also help you regarding scope definition:
1. Processes and services. Should I write about each service and each process specifically as part of the whole business model. Example : Managed Service Provider Service and all its processes Software Development Service and all its processes Software Support Service and all its processes Cloud Infrastructure Consulting Service and all its processes OR May I just put something more general that points to the idea that all the organizational business and processes are in the scope. A broader definition might be open to interpretation, but we really want the whole organization to be covered by the security benefits of having an ISMS in place. Example : Every service and process that is a part of the organization and its business is included in the scope.
Since your whole organization is part of the ISMS scope, you can use a text identifying your core business and including business management and supporting processes. Something like: Software development processes and their related supporting processes, and business administrative processes.
2. Organizational units May I just get away with putting down that the whole organization and all organizational units are included in the scope. Do I need to define organizational units if I am not going to leave any of them out of the scope ? Would an auditor be OK with that definition and would he/she understand that the whole organization is covered by the ISMS ? The problem is that the organization is fairly fluid and ever-moving and changing in regards to units and departments. This doesn't mean that people that are responsible for certain things are not appointed. Everything is logged, double checked and audited, but it would be a bit difficult to channelize every organizational aspect into a department or a unit.
Since your whole organization is part of the ISMS scope, then you can only state that the whole organization is in the scope.
3. Network and IT infrastructure This one seems really tricky for me. A lot of our IT infrastructure is ever-changing so to speak of - networks, devices, services are constantly added, removed, migrated, changed. If I need to list every piece of IT infrastructure and network that would be an Inventory of Assets of its own. So the question is - when I've actually done the work to mark every piece of data in the Inventory of Assets do I need to relist everything under the "Networks and IT infrastructure" as well ? May I just put in something showing the general concept of ISMS coverage ( i.e everything ). Would a definition like "All networks and IT infrastructure that are located in the ( and here I would just specify the location )" is a part of the scope. Our IT infrastructure is only in one physical location and also the cloud. We are using the IaaS model and sometimes PaaS as a model. In this regard I would list those in the supplier policies and not in the scope.
Considering your context, the proper definition here is the one you thought “All networks and IT infrastructure that are located in the <location>”.
This article will provide you a further explanation about defining scope:
This material can also help with defining scope:
In terms of ISO 17025 requirements, education and training records and evidence of competence are essential. Typically the diploma without a transcript will be suitable. Laboratories should, however, have recruitment criteria and minimum education requirements documented. If necessary, to verify a specific educational achievement for a particular position, a transcript would be required. This could, for example, be a result (e.g.,>70%) for a specific course; or diploma. Furthermore, depending on the sector, employees may need their transcripts to join a professional body mandated by legislation, for example, a veterinary association or professional scientists association.
To assist you, have a look at the Competence, Training and Awareness Procedure and the four related appendices, available as part of the toolkit, at https://advisera.com/17025academy/iso-17025-documentation-toolkit/
See too, the article How to manage competence in a laboratory according to ISO 17025 at https://advisera.com/17025academy/blog/2021/05/26/how-to-manage-competence-in-a-laboratory-according-to-iso-17025/
Companies that write and develop software embedded in the vehicle; should work on software design, verification, validation, configuration verification, etc., and document the details. These issues are related to the 8.3 and sub-clauses of the IATF 16949:2016 standard.