Search results

Guest

Guest

Create New Topic As guest or Sign in

HTML tags are not allowed

Assign topic to the user

  • New FMEA Handbook


    Answer:

    The FMEA handbook is both released and effective from June 2019. AIAG and VDA released a standard and common practice is that there will be a transition period. Your OEM will give you more detailed guidelines.
    Question:
  • ISO 27001 and GDPR

    Personal Data Protection Policy, Website Privacy Policy, Data Retention Policy, Data Retention Schedule, Data, Protection Officer Job Description, Cookie Policy, Inventory of Processing Activities, Data Subject Consent Form, Data Subject Consent Withdrawal Form, Parental Consent Form, Parental Consent Withdrawal Form, DPIA Register, Standard Contractual Clauses for the Transfer of Personal Data to Controllers, Standard Contractual Clauses for the, Transfer of Personal Data to Processors, Supplier Data Processing Agreement, Data Breach Response and, Notification Procedure, Data Breach Register, Data Breach Notification Form to the Supervisory Authority, Data, Breach Notification Form to Data Subjects, Data Subject Access Request Procedure, Data Subject Access Request Form, Data Subject Disclosure Form, Data Protection Impact Assessment Methodology, Cross Border Personal Data, Transfer Procedure, IT Security Policy, Access Control Policy, Security Procedures for IT Department, Bring Your Own, Device (BYOD) Policy, Mobile Device and Teleworking Policy, Clear Desk and Clear Screen Policy, Anonymization and Pseudonymization Policy, Policy on the Use of Encryption, Disaster Recovery Plan.

    Answer:

    Here you can find a list that specifies which documents cover the requirements of ISO 27001, and which are focused on GDPR: https://advisera.com/wp-content/uploads//sites/15/2019/04/List_of_documents_EU_GDPR_ISO_27001_Integrated_Documentation_Toolkit_EN.pdf

    For example IT security policy complies with clauses ISO/IEC 27001 A.6.2.1, A.6.2.2, A.8.1.2, A.8.1.3, A.8.1.4, A.9.3.1, A.11.2.5, A.11.2.6, A.11.2.8, A.11.2.9, A.12.2.1, A.12.3.1, A.12.5.1, A.12.6.2, A.13.2.3, A.18.1.2 if they are marked as applicable on the ISO 27001 Statement of Applicability.

    This article will provide you further explanation about ISO 27001 and GDPR:
    - Does ISO 27001 implementation satisfy EU GDPR requirements? https://advisera.com/27001academy/blog/2016/10/17/does-iso-27001-implementation-satisfy-eu-gdpr-requirements/
  • Implementation of ISO 27002


    Answer:

    First it is important to note that ISO 27002 is a support standard to implement ISO 27001, and it is not certifiable, which makes difficult to track the organizations which have implemented it.

    On the other hand, since ISO 27001 is a certifiable standard you can track which organizations have implemented it, but it requires some effort, because there is no central list of certified organizations (you must consult each certification body to track which companies are certified by them).

    However, the ISO site provides an ISO survey where you can find general information about certifications, like total quantity, quantity per country, quantity industry, etc. It does not nominate organizations.

    You can find this survey at this link: https://isotc.iso.org/livelink/livelink?func=ll&objId=18808772&objAction=browse&viewType=1 />
    This article will provide you furthe r explanation about ISO 27001 and ISO 27002:
    - ISO 27001 vs. ISO 27002
    https://advisera.com/27001academy/knowledgebase/iso-27001-vs-iso-27002/
  • Certification of remote companies


    Answer:

    In terms of certification you can state as location (company's headquarters) the home address of the founder / CEO of the company or the address of the office where the people accountable for the company can be found (you should ask the certification body what their preference would be in such situation). You can present this address as company's address and all other locations can be considered remote locations and can be audited accordingly.
  • Result of review

    We’re thinking we need to add a “Review Record Form” that we would fill out and sign before submitting our proposal to the customer; this form would be used to meet ISO requirements. However, we don’t otherwise see value in retaining the document. Couldn’t we just call our signed contract the “…documented information… on the results of the review…” that ISO 9001 requires in section 8.2.3.2 and not add another form into the mix?

    Answer
    When reading your description I was thinking in your proposal at the end. Why not consider both the proposal and the signed contract as evidence of review? I just see one possible problem: what if the client in the RFP does not include relevant legal or implicit requirements? If that is the case your proposed form could be useful to ensure that they are considered in the proposal.

    The following material will provide you information about documented information:
    - Article – List of mandatory documents required by ISO 9001:2015 - https://advisera.com/9001academy/knowledgebase/list-of-mandatory-documents-required-by-iso-90012015/
    - ISO 9001:2015 Internal Auditor Course - https://advisera.com/training/iso-9001-internal-auditor-course/
    - Book - Managing ISO Documentation: A Plain English Guide - https://advisera.com/books/managing-iso-documentation-plain-english-guide/
  • Keeping records


    Answer
    Is each organization certified? Is the common project under the scope of each certified management system? Let us suppose the answer is yes to both questions. Minutes can be kept on paper or on digital format. Even if minutes are written by an organization, the other, upon receipt can check the content and formally approve it or not.

    The following material will provide you information about documented information:
    - Article – New approach to document and record control in ISO 9001:2015 - https://advisera.com/9001academy/blog/2015/06/30/new-approach-to-document-and-record-control-in-iso-90012015/
    - ISO 9001:2015 Internal Auditor Course - https://advisera.com/training/iso-14001-internal-auditor-course/ course/
    - Book - Managing ISO Documentation: A Plain English Guide - https://advisera.com/books/managing-iso-documentation-plain-english-guide/
  • ISO 45001 Measurement requirements


    Answer:
    While I can’t write your report for you, some things you need to understand about he OH&S policy, OH&S objectives and OH&S legal requirements is that they will each have an aspect of measurement associated with them. The OH&S policy is the overall goal of the OHSMS, and as such the overall OH&S performance needs to be measured in accordance with the policy.
    The OH&S objectives need to be in line with the policy, and are intended to be measurable improvement goals for the company. For instance, an objective could be to reduce near miss accidents by 20% in the next 6 months. So, for this objective you will need to be monitoring and measuring the near miss accidents so you know if they are reduced.
    As for the legal requirements, there is a clause in the ISO 45001 s tandard which requires you to measure your compliance to your obligations, and legal requirements are obligations. Not only do you need to measure how complaint you are to these obligations, some legal requirements may also require measurement as well, such as the amount of air emissions.
    For more information on these topics I would suggest you look into our blog which covers many of these topics in more detail (https://advisera.com/45001academy/blog/) and to learn more about the ISO 45001 requirements see our free whitepaper: Clause-by-clause explanation of ISO 45001:2018, https://info.advisera.com/45001academy/free-download/clause-by-clause-explanation-of-iso-45001
  • GDPR and the privacy policy


    Answer:

    A Privacy Policy or a Privacy Notice is compulsory regardless if the data which is collected is processed for marketing purposes. The requirement comes from article 13 of the EU GDPR.

    The content of a Privacy Notice is described in art. 13 and 14 of the EU GDPR.

    You can find more information about the contents of a Privacy Notice from our webinar "Privacy Notices under the EU GDPR (https://advisera.com/eugdpracademy/webinar/privacy-notices-under-the-eu-gdpr-free-webinar-on-demand/)
  • Secure Development Policy

    - A.14_Secure_Development_Policy_Premium_EN
    - A.14.1_Appendix_1_Specification_of_Information_System_Requirements_Pre mium_EN
    This refers to various controls A.14.2.x which are not in the pack which are also referenced from https://advisera.com/27001academy/blog/2018/04/24/how-to-use-open-web-application-security-project-owasp-for-iso-27001/ which was posted last year. How do I get access to these, please?

    Answer:

    If you note on section 2 (Reference Documents) of the Secure Development Policy, except for control A.14.2.4 (Restrictions on changes to software packages) all other controls mentioned in the article are covered by this policy. These are the control from ISO 27001 covered by this policy: A.14.1.2, A.14.1.3, A.14.2.1, A.14.2.2, A.14.2.5, A.14.2.6, A.14.2.7, A.14.2.8, A.14.2.9 and A.14.3.1

    Control A.14.2.4 is covered by template Security Procedures for IT Department, located in folder 08_Annex_A_Security_Controls A.12_Operations_Security
  • Risk Registers


    Answer: ISO management standards do not prescribe how to implement risk register, so both approaches are acceptable. A single risk register can show you a systemic view of all risks the organization is exposed to, but it is also more complex to analyze. A risk register for each aspect helps you focus on relevant risks for each aspect, but it will require more administrative effort to maintain. You have to evaluate these situations to identify which approach is better for your organization.

    2. I also see that the risk assessment that came with the pack is asset based risk assessment.... is that mandatory?

    Answer: ISO 27001 does not prescribe a methodology, only that one must be defined and documented, so you can adopt the methodology that best suits your needs. The asset-based risk assessment is includ ed in the toolkit because it is the most common approach used for information security risk assessment, and this is also the one that provides the best balance between precision and needed effort.

    This article will provide you further explanation about risk assessment:
    - ISO 31010: What to use instead of the asset-based approach for ISO 27001 risk identification https://advisera.com/27001academy/blog/2016/04/04/iso-31010-what-to-use-instead-of-the-asset-based-approach-for-iso-27001-risk-identification/
Page 556-vs-13485 of 1128 pages

Didn’t find an answer?

Start a new topic and get direct answers from the Expert Advice Community.

CREATE NEW TOPIC +