Is ISO 13485 applicable to a non-profit organization?
Answer:
In this case, you have to contact the donors ( the companies that donated the medical equipment) to get the ISO 13485 certification from them.
Risk assessment for ISMS and BCMS
Answer:
Since BIA relates Impact over Time, and RA relates Impact and Likelihood, I'm assuming by your statement that the RA process used for BIA is using a 1-4 scale, and on the RA for the ISMS you are using the 1-5 scale. Considering that, you have two options to consider to have comparable results:
1 - Adopt a single scale for RA process used both for BIA and the ISMS
2 - Uses a constant to convert the risk value used on BIA to ISMS and vice versa
Considering the second alternative, for each risk value found using the scale 1-5 you must multiply it by .8 to find its equivalent risk value when using the 1-4 scale. For the reverse path (i.e., converting the value from 1-4 scale to 1-5 scale), the constant to be used is 1.25.
Is it possible NOT to provide employees with laptops and antivirus solutions. Our employees use their own laptops.
Our employees use windows defender. But we can not control if antivirus is on. We can not control if antivirus is updated and scheduled to perform period scans. So, we do not have any control and evidence. What are the options for us?
Answer:
ISO 27001 does not specify who should be the owner of the laptops or which kind of anti-virus software you should use - key point in ISO 27001 is how you deal with risks.
So if your risk assessment says that the risks to those laptops are acceptable even if you do not control the AV software, then you can leave the system as it is; if the risk is not acceptable, then you can require the users to install some kind of AV software where you can control how it operates.
Answer:
If you check ISO 9001:2015, clause 7.5, you will see several times the phrase “the organization shall”. However, the organization does not act as such, someone, a person or a function, has authority or responsibility to control the documented information. So, complying with ISO 9001:2015 clause 5.3, top management shall ensure that the responsibilities and authorities for relevant roles, including documented information control, are assigned.
Answer:
Since the beginning, since 1987, ISO 9000 and ISO 9001 always existed as separated standards. ISO 9001 includes the requirements associated with a quality management system and is auditable. ISO 9000 includes quality management principles and vocabulary and it is not auditable. So, ISO 9000:2015 still exists and is very useful for implementers.
The controller should always have a Data Processing Agreement in place with its processors pursuant to art. 28 of the GDPR. Based on the provisions of art. 28.3 (a) the processor needs to act only on the instructions of the controller.
So if the processor refuses to act based on the instructions of the controller it would be a breach of both the GDPR and the Data Processing Agreement.
1 - List of permitted devices: How detailed must the device be described? Is it enough to specify PC, laptop or mobile phone? Or should the exact type designation be given?
Answer: ISO 27001 does not prescribe detail levels for device description, so you can use detail levels that you consider sufficient to fulfill your needs, so either a general description or the exact type designation are acceptable for ISO 27001.
2 - Can you give me examples of mandatory device settings?
Answer: As examples of mandatory device settings we have:
- Use of screen lock with password
- Device encryption enabled
ISO 27001 certification
Answer:
The certification is related to the ISMS scope, so if the scope covers all organization, then certification goes to both units in USA and Russia. If the ISMS scope covers only the tech team and their activities, then certification goes to Russia, and if the ISMS scope covers only the headquarters, then certification goes to USA.
In fact the situation is the other way around. ISO 27018 works in two ways: (1) it augments existing ISO 27002 controls (ISO 27002 provides a detailed explanation of ISO 27001 security Annex A controls) with specific items for cloud privacy, and (2) it provides completely new security controls for personal data.
European Union Data Protection Directive of 1998
EU Internet Privacy Law of 2002 (DIRECTIVE 2002/58/EC)
Data Protection Act, 1998.
The electronic Commerce (EC directive) Regulations 2002.
Regulation of Investigatory Powers act 2000.
Basel II: BASEL capital accord (April 2003) (Basel Committee on Banking Supervision)
Regulation (EU) 2016/679 (EU General Data Protection Regulation (EU GDPR)), applicable as of 25 May, 2018
Act on Processing of Personal Data, Act No. 429, May 2000
Is there more? Is the Danish one outdated?
Answer:
Unfortunately, the list in this article is not fully up-to-date because it depends on voluntary contributions from our readers – therefore, it is likely that not all regulations for each country are listed (some even may have been withdrawn). To make sure you have the latest list of laws and regulations, it would be best to hire a local legal adviser.