1. Is it applicable to consider human resource policy among policies necessary during implementation of QMS
2.What human resource policy should reflect in context with QMS.
3. Which human resource policy suite best when implementing QMS
Answer:
Since all questions are related I will anwer them together. Basically human resources policies need to be aligned with the human resources requirements that are found in ISO 9001.
On the one hand, in the standard there are requirements for the people that are involved in the QMS processes and on the other hand, there are requirements for the people that need to achieve conformity of products and services. This is reflected in clause 7.1.2.
Also in clause 7.2, Competence, there are specific requirements to ensure people are competent adquiring the necessary knowledge. This also must be reflected in the HR procedure (if the organization decide to have it) or HR policies of the company.
For example, imagine that during the environmental assessment your organization determined that waste generation is a relevant environmental aspect. When evaluating context your organization can determine certain trends relevant for the environment such as: technological innovations that allow a more efficient use of raw materials reducing the waste generated. So, when you consider together that environmental aspect and the technological evolution, you can identify an opportunity to increase raw material yield and reduce an environmental impact.
It is legal to transfer personal data outside the EU if specific safeguards are implemented to ensure an adequate level of protection of the personal data.
(Hello, my question is the following: I use ISO 27001 to propose a security scheme in a mobile application ... or which standard you would recommend for the security scheme (mobile app).)
Answer: ISO 27001 can provide you a general security scheme, but for more detailed guidance on mobile application we recommend you to take a look at ISO 27034, an ISO 27001 supporting standard covering specifically application security. You can have a preview of this standard at this link: https://www.iso.org/standard/44378.html
You can also consider the OWASP project to built a robust application.
Answer: ISO 27001 certifcations are issue by organizations know as "certification bodies", which follow strict procedures to audit and report audit results to provide confidence on audit findings to interested parties (e.g., the organization itself, its customers, regulation bodies, etc.).
The choice of the certification body is an organization's decision, based on its strategies and business objectives and alignment with certification body practices.
Answer:
Sure, you can change scope of the SMS. That's even, in some particular cases, advisable. For example, large organization, complex (service/technology) landscape, etc. Rule is - start small and expand in a pace you can control.
There is a negative size of a s "small" scope - many elements are external to the SMS. So, you have to decide where to start and how to expand.
When changing the scope, you need to talk to your certification body and get an agreement i.e. confirmation from them.
Sharing documents
Answer:
Since this sharing is a legal requirement, this would not be a breach in the license use of our documentation. To protect your own information included in these polices, we recommend you to provide these with a warning to third parties that these policies should be shared only with personnel that needs them to perform their own work.
Planning internal audit
Answer:
You do not have to audit you certified ISMS against all clauses each year. For certification purposes you only have to ensure that all ISO 27001 requirements had been audited at least once before the next certification audit. Considering that, you can audit only part of the requirements on each annual internal audit, provided that at the next certification audit all requirements had been audited at least once. It will be acceptable for surveillance audits.
The best approach would be for you to check the surveillance audits schedule to verify which requirements will be covered by the next surveillance audit, so you can focus on them.
When performing an audit the auditor compares what is done in reality with the audit criteria:
Auditors go into reality. Collect audit evidences and compare them with audit criteria. From that comparison they develop audit findings. Audit findings indicate conformity or nonconformity.
So, the internal auditor uses the procedure as audit criteria to set the reference and to develop its checklist. Then, using the checklist the auditor verifies if practices are according to the reference.