My advice is that all cookies that are nor technical/strictly necessary cookies should be placed on the visitor's browser only based on consent especially if we are referring to tracking cookies.
Wording in ISO 9001
Answer:
You are correct, depending on the wording used documented information is mandatory or not mandatory. These are the words used in ISO (International Standard Organization) and their definitions:
- "shall" indicates a requirement
- "should" indicates a recommendation
- "may" is used to indicate that something is permitted
- "can" is used to indicate that something is possible, for example, that an organization or individual is able to do something
Answer:
Following ISO 9001:2015, I recommend determining risks about:
the overall intended results for the QMS;
products and services provided by the organization; and
management system processes.
Once determined the risks, risk management includes analyzing and evaluating those risks, determining the most relevant and deciding about what actions to develop in order to manage (control, eliminate, reduce, …) those risks. This way Risk Management allows an organization to focus on problematic areas and improve a QMS performance and outcomes. For example, an organization can decide where to perform quality control or where to use Standard Operating Procedures, to minimize certain risks from happening.
How should two departments QMS and Risk Management work together?
Answer:
The easiest way to implement your occupational health & safety management system (OHSMS) is to perform a gap analysis of what you already do against the requirements of the standard and then to put in place those things which you are missing. Every ‘shall’ requirement from the standard (anywhere that the work shall is used) represents something that you need to do in your OHSMS.
If you are starting from having nothing in place, the order of the standard is also very useful to follow as it mostly walks you through what needs to be put in place in the order that you might need to do so (for example, it starts with identifying what you organization is so that you can define the scope well). Unfortunately, there is no short cut to implementing the processes that you do not already have other than getting a helpful toolkit that will assist in documenting the processes.
After implementation, you will need to use your processes and then review and correct them as time goes on.
For a graphical representation of the ISO 45001:2018 implementation steps, see: Diagram of ISO 45001 Implementation Process, https://info.advisera.com/45001academy/free-download/diagram-of-iso-45001-implementation-process
It has a simple question-and-answer format that allows your customers to visualize which specific elements of a information security management system they’ve already implemented, and what they still need to do.
2. Would it be possible to obtain just the flowchart diagram without reference to the source?
Answer: It is not clear to which flowchart diagram you are referring to, but each time you quote or use part of material from an ISO standard, or from Advisera website, you need to refer to the source.
Monitoring a QMS
Answer:
You have a QMS with:
* overall desired results (quality objectives); and
* a set of processes (each process with one or more performance indicators).
So, an organization can develop a QMS monitoring tool based on a scorecard with those topics:
* what to measure;
* target;
* current performance;
* monitoring frequency.
1. Write the methodology (EBIOS: 2010 complying with ISO 27005)
2. Prepare Metrics (confidentiality, Integrity, Availability, Impact, Likelihood, risk apetite, maturity of controls...)
3. Risk management criterias
4. Essential Assets (Process)
5. Support Asset (Hardware, Software, network Links, persons, papers..)
6. Link between Essential assets and support assets
7. threat sources (humans, non humans ..)
8. Feared events (concerning the essential assets)
9. Threats scenarios (concerning the support assets)
10. Risk analysis (Impact, Likelihood, risk level, existing controls, Annex A, Prevention, protection, recovery, maturity, Action Plan , and recalcul Impact, Likelihood, Residual risk level, and acceptance of residual risk)
Is this methodology correct ? And what is next to do for continuing the implementation of BCP? I know I'm using the ISMS risk management methodology, is this right ?
Answer:
First it is important to note that risk a ssessment is mostly related to Business impact analysis (BIA), when you define which business processes and services are more critical, not Business Impact Plan (BCP), when you define actions to handle a disaster situation.
Considering that, ISO 22301 does not prescribe which risk methodology approach to use, only that risk assessment must be performed, so you can adopt any methodology you see fit for your organization, and the risk assessment and treatment methodology for an ISO 27001 ISMS can be adopted.
The single point of attention is that for business risk analysis you have to consider additional criteria than only confidentiality, integrity and availability (e.g., financial, environmental, etc.), so I'd suggest you to also consult ISO 31000 as reference, since it can provide additional criteria.
Once surveillance audit is concluded the auditor must hold an audit closure meeting, informing among other things the results of the audit:
- any non-conformities (minor and/or major), opportunities for improvement, and observations identified
- his recommendation for the certification body (certification maintenance, certification maintenance after presentation of action plan to handle minor conformities, or certification on hold until major nonconformites are handled)
After the audit closure meeting the auditor must deliver a copy of the audit rep ort and, in case there are nonconformities to be handled, define a deadline for the deliver of the action plan / solving of major nonconformities.