Start a new topic and get direct answers from the Expert Advice Community.
CREATE NEW TOPIC +Guest
Yes, ISO 9001 requirements are similar. Of course, each laboratory has different interested parties and clients (clauses 4.2 and 5.1.2) and have to comply with different standards and regulation (clause 7.5 about external documents). So, although the requirements are the same, the specific way of complying with them may vary from laboratory to laboratory.
You can find more information below:
Please note that before you start SoA you have some work to do (e.g., definition of the ISMS scope, Information security policy, risk assessment, and treatment methodology, etc.).
Considering that, we suggest you follow the order of folders and templates provided in the toolkit, so you minimize the complexity of your implementation and risks of rework.
Once you have completed the templates needed to support the SoA, you will have a better understanding of how to be filing it. In short, to start documenting the Statement of Applicability you need to perform a risk assessment and risk treatment, to identify the relevant risks and controls (from ISO 27001 Annex A or other sources) you will implement to treat them. Additionally, you need to identify legal requirements (e.g., laws, regulations, and contracts) which require the implementation of specific controls.
For further information, see:
Additionally, included in the toolkit you will buy you will have access to a video tutorial that will help you to fill in the Statement of Applicability.
Thank's for your response.
If you are transitioning from OHSAS 18001 to ISO 45001 during this year’s audit, then this is an ISO 45001 certification audit even if you were partially through your 3-year cycle on OHSAS 18001. This audit will confirm all of ISO 45001 implementation, and is therefore not the reduced audit you will see in a surveillance audit.
You can read a bit more on the certification process in the whitepaper: What to expect at the ISO certification audit: What the auditor can and cannot do, https://info.advisera.com/free-download/what-to-expect-at-the-iso-certification-audit
No, implementing a QMS according to ISO 9001:2015 is no bullet-proof vest against financial problems during pandemic Covid 19. However, I believe that having a QMS according to ISO 9001:2015 can help organizations in answer to the situation. In extreme situations, if your organization cannot operate due to mandatory shutdown from authorities, it is irrelevant being or not being ISO 9001 certified.
You can find more information below:
To monitor risk management, you want to evaluate how each of the four steps are performed:
You can list all the relevant situations where your organization failed with risk management by considering performance results, for example:
Each time any of these situations arrive, it is a signal that somewhere in our risk management methodology we failed. Then comes the need to determine the causes of those failures. For example, last week I worked with an organization that realized that its practice to determine risks during construction had to be improved. The person determining risks had no first-hand construction experience. So, instead of one person, they decided to use a small team.
You can find more information below:
Show them the pain.
Normally, people don’t change because of rational explanations; people change through their heart. Can you show them compelling examples of things that go wrong and damage organizational reputation or financial situation? Then, can you show them how a QMS could make a difference in mitigating each of those examples?
You can find more information below:
There is no difference in terms of methodology between 1st, 2nd, and 3rd party audits. They all have to be prepared, executed, and reported according to ISO 19011 requirements.
You can find more information below:
Please note that hidden risks can be related to:
Additionally, note that controls also can be related to legal requirements (laws, regulations, and contracts), and may need to be implemented even if there are no relevant risks.
If after considering these items you still find not enough controls related to risks or requirements, please note that typically smaller companies find 90 to 110 controls as applicable, whereas larger companies 105 or more, and some of these controls are marked as applicable only because organizations felt this was a logical decision (e.g., backup or passwords), and your organization can do the same.
These materials will also help you regarding risk assessment:
Please note that the ISMS responsible is a role an organization can create, or incorporate into an existing role, to cover at least these activities:
As for CISM (Certified Information Security Manager), it is a certification issued by ISACA which evidences that the certification holder has a certain set of knowledge and experience on information security management, which goes beyond the requirements related to ISO 27001.
This article will provide you a further explanation about roles for ISO 27001:
These materials will also help you regarding roles for ISO 27001: