Start a new topic and get direct answers from the Expert Advice Community.
CREATE NEW TOPIC +Guest
ISO 14001 gives a great framework for doing that. Determine environmental aspects and impacts, evaluate them, and develop a set of objectives and action plans in order to improve performance around the most critical, the most significant impacts.
Please check this information below with more detailed answers:
No, it is not mandatory to use the process approach with ISO 14001, but you can follow the process approach in the way you manage environmental aspects and impacts. For example, I like to draw the process of managing wastes from generation until leaving the organization, or the process of managing water from sourcing to disposal.
If you develop a register of environmental aspects and impacts it may be useful to have a column to identify the source of the aspect, and the source may be a product, a service or within the scope of a quality system process. This way it is easier to see where to act, to improve environmental performance.
You can find more information below:
What is the purpose of iso 14001? ISO 14001 sets out the requirements for an environmental management system (EMS). It helps organizations improve their environmental performance.
After updating your environmental assessment, you have a list of the most significant environmental impacts of your organization. So, it seems logical that a great EMS is a system that improves performance according to those significant environmental impacts. For example, if your organization is an intensive user of energy, or generates a lot of hazardous wastes, good KPI’s are the ones that measure performance on those two areas.
Please check below more information:
First is important to note that change management exists in ISO 27001 as one control from its Annex A (control A.12.1.2 Change management), but it can be excluded under certain conditions.
Provided that your organization does not have relevant risks or legal requirements (e.g., laws, regulations, or contracts) that require the implementation of change management, it is possible to be certified against ISO 27001 without implementing this control.
To see how a change management document compliant with ISO 27001 looks like, please see the demo on this link: https://advisera.com/27001academy/documentation/change-management-policy/
These articles will provide you a further explanation about the definition of controls and change management:
If this record of the router configuration is related to the information included in the certified ISMS scope (e.g., this router allows access to R&D servers, and R&D information is included in the ISMS scope), then it has to be audited at some point during the certification cycle (i.e., during surveillance audits), so the auditor can check if the router configuration allows access only for authorized entities, and as part of the certification process the auditor has the authorization to access this information to perform the audit.
This article may provide you further information:
I'm assuming that by asset-based risk assessment you mean the asset-threat-vulnerability approach.
Considering that, even in case a set of asset-threat-vulnerability rises no risk to the information that is part of the ISMS scope, you should maintain it in the Risk Assessment, for record purposes. First, because this way you can keep track of already identified sets of assets-threats-vulnerabilities you thought were relevant, which in future assessments will save you time in risk identification (you will not need to work on the identification of these risks again), and since the risk is a dynamic variable, in a future assessment these sets may indeed raise a risk that may require treatment (e.g. due to a technological change or new legislation).
These articles will provide you a further explanation about risk assessment:
These materials will also help you regarding risk assessment:
In ISO 27001, the involvement of top management is defined and documented in the Information Security Policy. The definition of top management involvement must consider the expected objectives from the ISMS, as well as the business objectives and strategies.
To see how an Information Security Policy looks like, see: https://advisera.com/27001academy/documentation/information-security-policy/
These articles will provide you a further explanation about the Information Security Policy:
ISO 9001 is an international standard about developing a quality management system (QMS). A manual is a particular kind of document. For example, can be used as an identity card of a QMS, explaining how it works and what are its parts. They are not the same thing.
The following material will provide you more information:
Thank you for the information. Regarding you being “shocked”, I agree with your concern. As I do not have all the context (it depends on the use of the record), I will answer generally with some comments to assist.
A laboratory implementing ISO 17025 and working towards accreditation must state the range of activities that conform to ISO 17025. For general activities, for example, document and record control, customer contracts, handling complaints and corrective actions, it is not appropriate to consider applying a conforming approach to some and a non-conforming approach to situations. The management system must cover all activities that could impact the policies and objectives (aligned to ISO 17025 purpose), otherwise, it defeats the purpose of the management system. The purpose of ISO 17025:2017 is to provide laboratories with the requirements to ensure competence, impartiality, and consistent operation. The purpose of the accreditation is to provide confidence in the operation of the laboratory. Beyond the overall requirements for common general activities, only the tests on the scope of accreditation need to comply with all the mandatory technical competency requirements such as completed metrological traceability, validation, participation in interlaboratory studies.
Bear in mind that often an auditee will answer in a way that does not reflect the real situation. What is required in an audit is objective evidence against specific criteria. When a response is given verbally, best practice is to ask an open-ended question to get to the basis of that response. With your knowledge of ISO 17025:2017 and laboratory operations, ask yourself where the higher risk or deficiency lies and go deeper there. In this case, it means looking at the criteria for confidentiality (clause 4.1), data and information management (clause 7.11), and customer requirements (clause 5.4); not document control. As an auditor notes the document control observation/concern to tie in later with other observations. You can also note a concern in the apparent gap in the responder's knowledge of the requirements (consider if the person should know details or have an awareness, depending on responsibility).
Any situation where you are looking for evidence that the organization has established and is maintaining their management to the extent required (or not), consider the operational, standard, and regulatory needs. For example, ISO 17025 clause 8.2.5 states personnel must have access to information required. That said, in order to minimize risks, protect the confidentiality and safeguard impartiality, an organization should only make the minimum information available, and only to that personnel who need it do to their work. Take a risk approach to the audit, considering the context. There are four questions to ask which will lead you to the criteria for deeming compliance or not. Ask: 1. What is the organization required by law?2. What has been agreed with the customer?3. What are the mandatory ISO 17025 requirements?4. What has the laboratory documented as a procedure, meaning what have they stated they will do?
Stating the non-conformance finding clearly against specific criteria will assist the laboratory to close the significant gaps.
The following may be of interest, to compliment your approach: