Start a new topic and get direct answers from the Expert Advice Community.
CREATE NEW TOPIC +Guest
Your assumption is correct. Since 2012 all ISO management systems share the same basic structure, which makes it easier to integrate them.
This article will provide you a further explanation about ISO 27001 structure and integration:
These materials will also help you regarding ISO 27001:
No, the medical mask does not require sterilization. It depends on the manufacturer what kind of mask want to put on the market, what are the customer requirements (for example hospitals) and so on.
Applicable standards for the mask you can find on the following link:
A company can have implemented ISO 13485 only for the Desing and development. In that case, some requirements will be stated as „non-applicable“, like: 7.5.3 Installation activities, 7.5.4. Service activities, 7.5.5 Particular requirements for sterile medical devices, 7.5.7 Particular requirements for validation of processes for sterilization and sterile barrier systems. The main procedure, in that case, will be Desing and development, which will replace the procedure for production and service provision.
For more information, please see the following article:
You can see how we have prepared the Design and development procedure in our ISO 13485:2016 Documentation toolkit:
"Firstly, I want to thank you so much for providing such help. It is really valuable.I would like to ask you about the following.Current situation:
I have a mobile application (Notes & todo lists) running on Android that stores & processes data.- This data could be personal or personally identifiable.- The app stores the data on the user's device in the app folder that is accessible by the user only.- We do not collect or store any data in the cloud.- The app also has google ads. Users are informed and have to give consent before using the app- There is no requirement for sign up or requests for email, name, passwords, financial information etc.- Data stored (because it is a notes app) can be personal interests, schedules, names, numbers etc.
What I would like to know:
Considering the app above:If I do not encrypt the data stored in the device am I in breach of GDPR?
The GDPR lets the controller decide if security measures as appropriate to the data processing or not, so encryption can be a good security measure and it is recommended but it is non-mandatory. Article 32 GDPR states that the controller needs to consider the risks for freedom and rights of users, the state of art, the costs of implementation, the nature, scope, and purpose of processing and to balance it in order to verify the appropriate security measure (i.e., the app may not encrypt data because are stored on user device but request two-factor authentication or access with fingerprint).
Do I need to appoint an EU Data Protection representative?
If you are not located in the EU yes you need to appoint an EU representative, as required by Article 27 GDPR.
Does the GDPR really apply to this application since there is no collection of data and only the user has access to it?Thank you so much for your help."
GDPR applies to data processing which is defined by Article 4 GDPR “any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction;”
Your app records and makes available personal data to the user so it processes personal data, then your company probably acquires data of users who downloaded the app, their device numbers or email or Google Play account, in fact, you ask consent for processing data, the GDPR will apply even if your app does not transmit personal data of your user you still process other personal data (device number, email, google accounts, etc.).
Here you can find more information on GDPR implementation:
If you need to understand how to process personal data under GDPR, you can consider enrolling in our free online training EU GDPR Foundations Course: https://advisera.com/training/eu-gdpr-foundations-course//
Your organization as the client has the authority to determine qualification requirements for suppliers. If they want to serve your organization, they have to comply.
However, there is nothing in ISO 9001:2015 requiring that suppliers must be ISO 9001 and IATF-16949 certified.
The following material will provide you more information:
Has any requirements for the auditor for conducting an internal audit and how to ensure the auditor conduction audit is competent?
Answer:
Each organization has the authority to determine the competence requirements of its internal auditors. Normally, organizations consider that internal auditors should have knowledge of the audit criteria (ISO 9001:2015 in this case) and should have training in internal audits. You can even decide that an auditor has to study a book on audits or attend an online course and do an in-house exam. Internal auditor competence requirements can be established in a job description, for example. Audit competence or audit effectiveness can be measured, for example by comparing internal audit results with external audit results.
Is it any requirements for attending internal audit training and getting certificates?
If have please give a reference on İSO 19011.
Answer:
No, there is no formal requirements for choosing people to attend internal audit training. Anyone can be internal auditor, unless psychologically they do not want to do it.
The following material will provide you information about internal auditors:
1. Should evidence of competence be related to Information Security, or IT, or something else? Which competence do we have to justify? Should we have the evidence for everybody, or only just for IT Manager or Admins e.g.?
The evidence of competence must be related to issues and activities that can impact the ISMS (e.g., secure development for the development and maintenance of information systems included in the ISMS scope, audit techniques for internal auditors, etc.).
You need to evidence competency of anyone who has an impact on the performance of the ISMS, i.e., those who put together and manage the ISMS (e.g., managers and technical staff), and also of those who have to follow the policies and procedures (e.g., all employees included in the ISMS scope).
These articles will provide you a further explanation about competence evidence for ISO 27001:
These materials will also help you regarding competence evidence for ISO 27001:
2. What if we have an online learning platform with Data Privacy Training, but only half of the employees completed that training? I don't think it is enough, can it raise a non-confirmity?
The answer to this question will depend on your defined ISMS scope. In case your ISMS scope is all the organization, and data privacy protection is a requirement for the ISMS, then this situation can rise a non-conformity.
These articles will provide you a further explanation about ISMS scope and readiness for certification:
These materials will also help you regarding ISO 27001:
When thinking about environmental objectives I recommend two elements to frame them:
So, during COVID times, was the list of environmental aspects and impacts updated? And the classification also? Perhaps some significant aspects from the past are not so significant for the time being, and vice versa. Do any significant environmental aspects relate to supporting the work from home? I will not consider what happens inside each employee’s house to avoid intrusion or harassment charges. For example, considering the life cycle, is an environmental aspect emerging as relevant? How environmentally friendly are your internet suppliers, or your web storage suppliers?
First, chose the environmental aspects. Without that, it is artificial trying to come up with relevant environmental objectives.
Please check this information below with more detailed answers:
Generally speaking, a risk assessment methodology compliant with ISO 27001 has these 5 elements:
Provided CIS CRAM can fulfill these requirements, it can be used in an ISO 27001 context.
We are not experts in CIS RAM, but based on the material provided in the Center for Internet Security (https://www.cisecurity.org/white-papers/cis-ram-risk-assessment-method/), this methodology seems too complex for beginners (please note that risk assessment is more useful when everyone in an organization can use it by themselves in a quick way, not depending upon few persons).
To see a risk assessment methodology compliant with ISO 27001 that we consider simple to learn and use, please access this free demo template: https://advisera.com/27001academy/documentation/Risk-Assessment-and-Risk-Treatment-Methodology/
These articles will provide information about risk management in ISO 27001:
This material will also help you regarding risk management:
If you have already marked medical device according to the MDD, your certificate is valid until the expiry date on the certificate, but not longer than May 2024.
Transition steps from MDD to MDR are as follows:
1) First, you need to check if the classification of your medical device changed. Go to Annex VIII – Classification rules - and check-in which rule your medical device falls now.
2) Take Annex I – General safety and performance requirements – and go through each requirement to check how is that requirement fulfilled for your medical device. Of course, not all requirements from this Annex I are applicable to all manufacturers. For example, if your medical device is not sterile, then requirements in section 11. Infection and microbiological cleanliness – are not applicable to you.
3) Then review your technical file and compare it with the documentation requirements from the Annex II Technical documentation and Annex III – Technical documentation on post-market surveillance. If you see that some documentation/information is missing, prepare those documents.
4) Review your QMS because there are some additional requirements regarding the QMS – MDR Article 10, paragraph 9, and Annex I. For example, there is a requirement that within QMS there should be a strategy for regulatory compliance. Also, there is a necessity to put as part of the QMS Clinical evaluation process (Chapter 6) and Post-market surveillance system (Chapter 7).
5) Assign for the UDI number - The UDI, in general, is provided by an official designated entity. On the MDCG 2019-1 guiding principle of issuing entities rules on Basic UDI-DI, there are some requirements to follow.
For periodic audit that will be conducted after May 2021, you need to have prepared a Post-market surveillance system, vigilance system, and defined economic operators according to the MDR (for more details see Article 120).
Here you can find all the information:
EU MDR Article 10 – General obligations of manufacturers https://advisera.com/13485academy/mdr/general-obligations-of-manufacturers/
EU MDR Article 120 – Transitional provisions https://advisera.com/13485academy/mdr/transitional-provisions/
EU MDR Annex I - General safety and performance requirements https://advisera.com/13485academy/mdr/general-requirements/
EU MDR Annex II – Technical documentation https://advisera.com/13485academy/mdr/technical-documentation/
EU MDR Annex III – Technical documentation on post-market surveillance https://advisera.com/13485academy/mdr/technical-documentation-on-post-market-surveillance/
EU MDR Annex VIII – Classification rules https://advisera.com/13485academy/mdr/classification-rules/