Start a new topic and get direct answers from the Expert Advice Community.
CREATE NEW TOPIC +Guest
Below I list a set of articles about what ISO 14001 is, what its benefits are for several interested parties, and how to implement it. ISO 14001 is about improving the organization's relationship with the environment through a systematic approach with its environmental aspects and impacts. That is why I added an article on aspects and its evaluation. Perhaps you can enroll in our free ISO 14001:2015 Foundations Course. During that course, you will be provided with suggestions for articles, templates, and other materials that can introduce you to ISO 14001.
Please check this information below with more detailed answer:
In fact, change in the ISMS scope is quite a common business and your organization can perform this change in the ISMS scope. The ISMS scope can be defined as the whole organization, or as part of it (in terms of locations, departments or processes), and the scope can increase or decrease in size according to the organization's needs.
These articles will provide you a further explanation about the scope definition:
This material will provide you a further explanation about the scope definition:
Although the ISO 27001:2013 standard does not define the terms ‘needs’ and ‘expectations’ when it talks about the needs and expectations of interested parties, it is helpful to think of them in this way. Needs are those things that interested parties have clearly stated or written down, such as a law that you need to meet (e.g., GDPR), or an information security requirement in a contract. Expectations are the unwritten things that the interested parties reasonably assume you will do, such as accurate tracking of information to meet those laws or timely addressing information security incidents when they occur.
You can learn more about the requirement in this article:
ISO 27001 does not prescribe how to document your information security policies, so organizations are free to document them as they see fit.
The general practice is to have information security policies as internal operational documents, and including only references to them in contracts, as contractual clauses.
This article will provide you a further explanation about documenting policies and developing employment contracts:
After the warranty complaints are received by the dealer if the problem is part of the warranty scope and is not related to end-user (driver/passenger) error; the subject and the faulty part should be forwarded to the relevant automotive OEM company. Especially if it is an issue related to faulty part driver and vehicle safety than much faster reaction must be shown.
Depending on the situation, either a part replacement or temporary vehicle supply is provided. According to the investigation result of the OEM company, the customer must be answered in writing.
Generally, this process is carried out by departments such as after-sales services, etc
IATF 16949 rules have no defined time frame for the transition from ISO 9001:2015 to IATF 16949:2016. When the organization is ready according to IATF 16949:2016, it must take the stage 1 audit and, if the result is ‘’ready’’ then to start stage 2 audit, which is the main audit within 90 days after stage 1 audit. In my experience, a firm that effectively implements ISO 9001: 2015 says it will be ready for the IATF 16949: 2016 audit, with 6 months of work.
For more information, this article might be useful:
According to the IATF 16949: 2016 standard, any documented information should be under control. As you know, the documented information, all kinds of records such as procedure, instruction, control plan, processes, training records, job descriptions, etc.
My advice is, create a form number, revision number for the to-do list so that everyone in the organization can use the same to-do list.
Thus, the to-do list becomes a controlled document.
SO 27001 does not provide specific controls for cloud computing, but you can adopt and adapt some of its controls for cloud computing.
For example, you can use control A.8.3.2 Disposal of media (which states that media must be disposed in a secure and formal way when no longer required), considering that virtual machine as a "media".
For specific recommendations about cloud computing, you can consult ISO 27017 and ISO 27018, which provides specifics applicable to cloud computing regarding controls from ISO 27001 Annex A.
These articles can provide you more details on data disposal in ISO 27001:
These articles will provide you a further explanation about ISO 27017 and ISO 27018:
Training on ITIL covers some topics related to information security that can provide evidence of competence that can help achieve ISO 27001 compliance.
These articles will provide you a further explanation about competences, ITIL, and ISO 27001:
This material will also help you regarding competences on information security: