Start a new topic and get direct answers from the Expert Advice Community.
CREATE NEW TOPIC +Guest
The GDPR only states that the data controller must ensure that data are “processed in a manner that ensures appropriate security of the personal data, including protection against unauthorized or unlawful processing and against accidental loss, destruction, or damage, using appropriate technical or organizational measures (‘integrity and confidentiality).” (Article 5 paragraph 1, f) GDPR)Article 32 GDPR, among the obligation of the data controller, states that:“Taking into account the state of the art, the costs of implementation and the nature, scope, context, and purposes of the processing, as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller, and the processor, shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate:
A) the pseudonymization and encryption of personal data;
B) the ability to ensure the ongoing confidentiality, integrity, availability, and resilience of processing systems and services;
C) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident;
D) a process for regularly testing, assessing, and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing. In assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from an accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to personal data transmitted, stored, or otherwise processed.
Setting access policies and determining roles and responsibilities is considered an organizational security measure and of course there is no indication of what technical security measures must be applied, the aim of GDPR is to be technological neutral but ISO27001 standard on the security of information can be a good guide.
Here you can find some information on security aspects and GDPR:
It depends on the country you are located in. I would choose a consultant from where I'm based in order to have an idea of the privacy legislation which applies to my current situation.
If I understand it correctly, your device will be a system. According to the Definitions in the MDR system (point 10) is a combination of products, either packaged together or not, which are intended to be interconnected or combined to achieve a specific medical purpose.
The question here is: are parts separately certified as medical devices?
For systems that consist of parts that are medical devices, according to Article 22, you need to prepare the statement that will have the following information:
However, if your parts are not a medical device, that it needs to be certified as a system separately. In that case, you need the involvement of the Notify body, you need to prepare applicable technical documentation according to Annex 2 and 3 of the MDR, and in that case, you will put a CE mark on that system.
For more information, see:
Actually, there is no definitive order to perform Risk Assessment (RA) and Business Impact Analysis (BIA), and the choice for one or another will depend on your expectations:
Particularly, we prefer to do a risk assessment first, because this way you will have a better impression of which incidents can happen (which risks you’re exposed to), and therefore be better prepared for doing the business impact analysis (which focuses on consequences of those incidents).
For rating critical services considering the results of a risk assessment, you can consider the value of the risks, or the number of risks, associated with a specific service. For example, you can have a service with two high risks associated with it and other with ten medium risks associated with it. Considering your context, in terms of risks maybe the second service is more critical.
These articles will provide you a further explanation about risk assessment and BIA:
These materials will also help you regarding risk assessment and BIA:
In this free webinar on-demand - How to implement risk management in ISO 9001:2015 - https://advisera.com/9001academy/webinar/how-to-implement-risk-management-in-iso-90012015-free-webinar/ - I show some examples of determining risks and then acting on them. ISO 9001:2015 mentions risk about:
Your organization is a set of interrelated processes. Each process is a set of activities that transform inputs into desired outputs.
ISO 9000:2015 defines risk as to the effect of uncertainty. Because there is uncertainty, sometimes we don’t have the expected:
What is a non-conformity? We don’t design processes to deliver non-conformities. So, when a non-conformity happens, we have the manifestation of risk. Non-conformities are potential risks that have materialized. Same for complaints.
Seen in this way, the risk-based approach is a very effective methodology for developing a plan to control a process and its results. The control will materialize, for example, in operations of control, verification, improvements in the process, in work instructions, in improvements in monitoring, in increasing the competence of the participants.
You can find more information below about risks.
thank you so much.
1. When the ISO needs to be finished / audited? (e.g. when company is founded, when first device is sold or…? – E.g. Section 7: Product Realization is with planning etc. is running right now while the company is not yet founded.
ISO 13485 must be implemented and certified before manufacturing starts and before you put a medical device on the market. You have to prepare your quality management system like you can start the production right now. Of course, you can have some pilots production conducted, due to perform validations of certain processes, like cleaning and sterilization.
2. Is English as language enough or is the country language additionally necessary?
Given that notifying bodies reviewing the quality system according to ISO 13485 are internationally recognized, that they have offices in different countries, English is sufficient.
3. Is the IVD guideline 98/79/EG (IVDD) and/or German “In-vitro-Diagnostika-Verordnung (IVDR)“ additionally necessary and incorporated in your toolkit? If not, can you recommend a toolkit for this? Background: In simple terms, the product is a special microscope with which a view of a tissue sample can be created and viewed. The interpretation of this image is done by a pathologist (unlike, for example, a blood pressure monitor, where the device interprets something). Staining of the tissue sample is done outside the device using standard procedures/products from appropriate manufacturers (e.g. H&E staining).
Our ISO 13485:2016 documentation toolkit is prepared for all small manufacturers of medical devices. Since In vitro diagnostic products are also medical devices, our ISO 13485:2016 toolkit is applicable for in vitro diagnostic product manufacturers.
With the usage of the Advisera toolkit, you can definitely save a lot of money. Templates are arranged so that they meet all the requirements of ISO 13485 in a logical sequence. Your task is to write down in the documentation the name of a particular job in your company is and possibly to add some specifics.
On average, we can say that for the company with 10 employees it will take 3-4 months, for the company with up to 50 employees, some 8-12 months.
As for the preparation of technical documentation for a Class IIa medical device, it all depends on whether your product is completely finished (or is still in the development phase), and whether you have done all the necessary tests.
I would like to point out here that if you take the documentation toolkit from Advisera, you are not just getting templates. YOu are also receiving e-mail support, review of the documents, and live on-on-on online consultations.;
For more information please see the following:
1. How detailed and far does the inventory of assets need to be? (do we need to list each laptop and cell phone for example)
ISO 27001 does not prescribe any level of detail for the inventory of assets, so you can adopt the levels you understand that will better fulfill your needs.
This is generally a balance between the administrative effort and the need for information to ensure proper security. For example, you do not need to record organizations laptops as individual assets (you can add a single asset called "laptop"), but if they have specific purposes with different risk levels you can use specific assets like "laptop", "development laptop", and "finance laptop". The same concept applies to cellphones of your organization and other assets.
For further information, see this article:
These materials will also help you regarding:
2. When a risk assessment is performed does the risk owner have to do a risk assessment on all the assets every year or the assets that are deemed to be threats or vulnerable.
The update of risk assessment needs to be performed over all assets included in the ISMS scope, at planned intervals (e.g., quarterly, semiannually, annually, etc.) or when significant changes occur (e.g., deployment of new technology, new business, etc.). This is so because changes in the context of the organization may result in assets previously not relevant to become relevant and vice versa, which can affect treated risks and the risk treatment plan.
For further information, see:
These materials can also help you:
3. Why is the inventory of assets not listed under the reference document as well as 3.1.2 in the Risk assessment and risk treatment Methodology document?
Please note that for performing risk assessment and risk treatment you do not need an inventory of assets. The only information you need is assets' names and assets' owners, which can be maintained in the Risk Assessment and Risk Treatment tables, making an inventory of assets unnecessary.
Additionally, the inventory of assets for ISO 27001 is a control (A.8.1.1), and before performing risk assessment and risk treatment it does not make sense to apply a control (at this point there is no identified need for it).
This article will provide you a further explanation of controls selection: