I need an advice as to which Certification course can I first start to enroll with the academy.
I have looked at your prices compared to BCI, I have found them cheaper as I have to pay it myself
Answer: Since you mentioned BCI (Business Continuity Institute), I'm assuming you are looking for business continuity training. Considering that, unfortunately at this time we do not have available courses related to this topic. If you want to consider the ISO 22301, the ISO standard for business continuity, I'd suggest you first to take a foundations course to understand the standard and its requirements.
Answer
Changing parameters of an established product is not necessarily the outcome of design and development. If the company does not launch new products design and development is not applicable. But in our days it is difficult to stay in the market without periodically launch new products.
The best pathway will depend on your professional objectives. If you plan to work on an Information Security Management System certification process, then you should consider the Lead Implementer certification. If you plan to ensure the operation of an ISMS, then you should consider the Lead Auditor certification. Considering your current work, Lead Implementer certification seems more appropriated.
Your understanding about referencing risks on SoA is correct, but I'd like to comment that incorporating the Risk Assessment and Risk Treatment in a single spreadsheet is not a recommended approach. Although it may simplify documentation, it also creates a bigger document that is more difficult to read and work with, besides the fact that it leaves open information about risk treatment to personnel that only is required for risk assessment. For example, most people can participate in the risk assessment process, but definition of risk treatments and controls may be restricted only to personnel who will work on the implementation of such treatment. You should evaluate this situation to verify if using a single spreadsheet will not raise significant risk.
Information security in organizational chart
Answer:
Since your organization has a CRO (Chief Risk Officer), and I'm assuming that by that there is an organizational-wide risk management process, you have two options:
- Leave CRO in charge of the Information security risk management, and the CISO will provide the criteria by which information security risks will be evaluated considering the CRO risk management process approach.
- Leave CISO in charge of the Information security risk management, and the CRO will provide the requirements the information security risk management process will have to follow to stay compliant with the organizational-wide risk management process approach.
Implementation steps
Answer:
Your assumption is correct. Policies, procedures and other documents included in Annex A folder will be implemented according to the results of risk assessment and the definition of the Risk Treatment Plan.
Answer: Please note that included with the toolkit you bough you have access to a video tutorials that can help you fill in the most critical documents (e.g. risk assessment and risk treatment tables, risk assessment methodology, etc.) These videos have examples with real data.
2 - How are cloud providers treated in risk and asset inventory?
Answer: Cloud providers can be treated in the category of Outsourced services on both risk and asset inventory.
Internal Auditor Courses and SQF
Answer
No, Advisera’s Internal Auditor Courses do not include the SQF standard, only ISO 9001, ISO 14001 and ISO 27001. Besides that, Advisera’s Internal Auditor Courses include good auditing practices for preparing, performing and reporting an audit, applicable for auditing SQF standard.
Sorry, but I think there is a misunderstanding here. The comment on column F of the asset inventory mentions the Risk Assessment Table, not the Risk Treatment, and on the Risk Assessment Table you have all assets considered in your ISMS scope.
As a last note, listing the consequences in the Asset inventory is not mandatory (it is only a best practice so you can quickly verify the impacts related to an asset without having to open another document.
GDPR and data processing
Answer:
I would advise against using consent as a lawful basis for the processing of personal data especially considering the latest fine issued by the Greek Supervisory Authority. As a general rule, you should be avoiding consent when processing employee data.
2. Is processing of bank details for payments allowed by GDPR?
Answer:
Yes, it is. The GDPR does not forbid certain data to be processed however you would need to set up additional security measures to protect bank details. You should also check if you need to be PCI compliant as well.
3. As a real estate company do I need to have a Data Protection Officer?
Answer:
It is quite unlikely unless (a) the company has more than 250 employees, or (b) the processing the company carries out is likely to result in a risk to the rights and freedoms of data subjects; or (c) the processing is not occasional; or (d) the processing includes special categories of data (personal data revealing racial o r ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, and the processing of genetic data, biometric data for the purpose of uniquely identifying a natural person, data concerning health or data concerning a natural person’s sex life or sexual orientation);or (e) the processing includes personal data relating to criminal convictions and offenses.
4. Can I ask clients for a declaration that they are not alowed to contact the owner directly ?
Answer:
This is not necessarily related to the GDPR so you should check this with a lawyer that knows your local laws.