Start a new topic and get direct answers from the Expert Advice Community.
CREATE NEW TOPIC +Guest
ISO 27001 requires that documents from an external origin relevant to the ISMS be identified and controlled, but it does not define how, so organizations are free to implement the approach that better suits them. Internal and external contacts can share the same identification approach, but as a good practice you should consider different ways, so you can track them more easily, especially if you have more contracts from one type than the other.
Regarding change control, what generally happens with contracts is that changes on them are included as annexes, pointing out which clauses have been included, excluded, or changed, so you do not need to use a tablet to perform change control.
This article will also help you regarding document management and ISO 27001:
These materials will also help you regarding document management and ISO 27001:
You are right in thinking that a publicly listed email on the website is free to hand out, but the GDPR requires also to use personal data (i.e. email address) for the purposes for which are given. If someone lists the email address on his/her website, he/she wants to be contacted about his/her own activity (i.e. as a book blogger) they are not giving their consent to be inserted in an email database.
You should contact them and ask for consent, even with automatic means, by asking them to be inserted in an email database for that purpose. You can imagine it as a service (something like “do you want to be updated with new authors publication?” or whatever your marketing team could imagine) and you need to ask them to consent to the transfer their address to third parties (authors).
Here you can find some articles about privacy policy and consent:
These materials will provide further help:
thanks a lot for your replay. that was helpful. Kind Regards, Elina
The personal data you are going to collect is considered as sensitive data and are ruled by Article 9 GDPR because they refer to individuals’ health. You need to ask the consent of the interviewed person for collecting and showing results to the moderator.
Pseudonymization can be a good solution to protect the identity avoiding to show their name and calling them as “case 1” and “case 2”. Moderators can have access to full documentation upon request. You must specify that in the privacy notice you are going to submit to your individuals before interviewing them. You can also establish a data retention period and inform the interviewed individuals about how long the project will last and you are going to keep their data.
Here you can find some articles about privacy policy and consent:
EU GDPR document template Privacy Notice: https://advisera.com/eugdpracademy/documentation/privacy-notice/
You may also consider enrolling in this online EU GDPR Foundations Course: https://advisera.com/training/eu-gdpr-foundations-course//
ISO 19011, the most used ISO audit standard uses the term "recommendation" to refer to results that are not a non-conformity but the organization must take a look at to see if they can lead or not to an opportunity for improvement.
This article will provide you a further explanation about the opportunity for improvement:
These materials will also help you regarding audits:
1. I have a question to ask. Do we do the gap analysis first or IT risk framework?
I'm assuming your questions are about ISO 22301 implementation and the management of IT-related risks.
Considering that, first is important to note that ISO 22031 does not require a gap analysis to be performed, while the risk assessment is mandatory. Second, gap analysis is not recommended for smaller companies, because in general, it is not worth the effort due to their size and complexity. So, for smaller companies, it is better to perform only the IT risk framework, because will give you more specifics about handling risks in your IT environment.
For bigger companies, the gap analysis will provide you a quick and comprehensive view of how much of the standard you already have implemented, and the results of gap analysis can be used as input for the IT risk framework.
2. Which is easier to do? Looking forward to your feedback.
Because gap analysis requires an overview of the situation, and the IT Risk Framework involves a deeper knowledge of risk management steps, the gap analysis would be easier to perform for a beginner.
This article will provide you a further explanation about the gap analysis and risk assessment (although the article is about ISO 27001 the concepts also apply to ISO 22301):
The approach for the surveillance audit is basically the same for a certification audit, the difference being in the fact that in the surveillance not all ISMS scope is audited. Considering that, for the surveillance audit you should check:
These articles will provide you a further explanation about preparing for an audit:
These materials will also help you regarding preparing for an audit:
As far as I understand your situation and questions:
Your company can calibrate monitoring resources internally and use those monitoring resources to make measurements and issue reports for customers. However, to perform that calibration your company must use measurement standards. Those measurement standards must be calibrated against measurement standards traceable to international or national measurement standards. Normally, that traceability requirement makes mandatory to calibrate measurements standards at a calibration lab.
You can find more information about calibration below:
I'd suggest you t take a look at ISO 27004 (https://www.iso.org/standard/64120.html), a supporting standard that provides guidelines to help organizations in evaluating the performance and the effectiveness of an ISMS.
These articles will provide you a further explanation about performance evaluation:
Yes, the procedure for determining the context of the organization is not mandatory. Please, check this article - List of mandatory documents required by ISO 9001:2015 - https://advisera.com/9001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-90012015/
The following material will provide you information about the context of a quality management system: