It is legal to transfer personal data outside the EU if specific safeguards are implemented to ensure an adequate level of protection of the personal data.
(Hello, my question is the following: I use ISO 27001 to propose a security scheme in a mobile application ... or which standard you would recommend for the security scheme (mobile app).)
Answer: ISO 27001 can provide you a general security scheme, but for more detailed guidance on mobile application we recommend you to take a look at ISO 27034, an ISO 27001 supporting standard covering specifically application security. You can have a preview of this standard at this link: https://www.iso.org/standard/44378.html
You can also consider the OWASP project to built a robust application.
Answer: ISO 27001 certifcations are issue by organizations know as "certification bodies", which follow strict procedures to audit and report audit results to provide confidence on audit findings to interested parties (e.g., the organization itself, its customers, regulation bodies, etc.).
The choice of the certification body is an organization's decision, based on its strategies and business objectives and alignment with certification body practices.
Answer:
Sure, you can change scope of the SMS. That's even, in some particular cases, advisable. For example, large organization, complex (service/technology) landscape, etc. Rule is - start small and expand in a pace you can control.
There is a negative size of a s "small" scope - many elements are external to the SMS. So, you have to decide where to start and how to expand.
When changing the scope, you need to talk to your certification body and get an agreement i.e. confirmation from them.
Sharing documents
Answer:
Since this sharing is a legal requirement, this would not be a breach in the license use of our documentation. To protect your own information included in these polices, we recommend you to provide these with a warning to third parties that these policies should be shared only with personnel that needs them to perform their own work.
Planning internal audit
Answer:
You do not have to audit you certified ISMS against all clauses each year. For certification purposes you only have to ensure that all ISO 27001 requirements had been audited at least once before the next certification audit. Considering that, you can audit only part of the requirements on each annual internal audit, provided that at the next certification audit all requirements had been audited at least once. It will be acceptable for surveillance audits.
The best approach would be for you to check the surveillance audits schedule to verify which requirements will be covered by the next surveillance audit, so you can focus on them.
When performing an audit the auditor compares what is done in reality with the audit criteria:
Auditors go into reality. Collect audit evidences and compare them with audit criteria. From that comparison they develop audit findings. Audit findings indicate conformity or nonconformity.
So, the internal auditor uses the procedure as audit criteria to set the reference and to develop its checklist. Then, using the checklist the auditor verifies if practices are according to the reference.
GDPR Data Controller or Data Processor
Thanks a lot Andrei
Process, procedures and documentation
Answer
Let us start by the second question about the difference between processes and procedures. A process is a set of activities taken in order to achieve a particular end. A documented procedure is a written description about how to perform certain activity or activities. So, process and procedure are two different things. About the first question the answer is yes. One can document a 9001 process in a procedure but remember a process is much more than a procedure.