First of all, we want to apologize for this confusion.
Acceptable Use Policy is an old name for the IT Security Policy, they are exactly the same document. This difference is a mistake in our website and we will correct this immediately.
If your organization is more comfortable to use one name over the other there is no problem to change the document name, you only have to take care to propagate this change to all documents which currently refer to this document.
Auditing subcontractors?
Answer:
ISO 9001:2015 does not mandate audits on subcontractors. It is up to each organization to decide what kind of control is needed. Be sure to evaluate your subcontractors periodically based on the results of your checks and other information considered relevant by your organization.
The following material will provide you information about evaluating suppliers:
>Just to mention the team is not part of the scope as reply to the answer .
Answer: In this case the auditor has no previous authorization to audit this provider. He must justify his intention and the organization can decide to authorize or not the audit at its own discretion, but his most probable action is to check how you are managing the relationship with this service provider, i.e., how you can assure that this service provider is fulfilling your security requirements.
Answer:
As with any management system standard the requirement to implement AS9100 Rev D comes down to your customer requirements. If your customer does not require that you implement AS9100, even if you are an aerospace company, then the choice is up to you if you implement this standard. I do not know of a percentage of businesses that this would apply to as you have suggested, but in reality, everything comes down to the requirements of the customer, and baring that the desire of the company to use this standard to their benefit.
For more information on the benefits of AS9100 Rev D, see this article: 7 Key benefits of AS9100 implementation, https://advisera.com/9100academy/knowledgebase/7-key-benefits-of-as9100-implementation/
Regarding specific roles and responsibilities for information security, they are defined through all documents used in the ISMS implementation.
Regarding the Risk Treatment Plan, the responsibilities are defined on column "Responsible person". By the information you provided, it seems you are referring to the Risk Treatment Table, which is a different document.
First of all, you have to perform a risk assessment to identify which risks related to BYOD practice you have to treat, and which legal requirements (e.g. clauses of contracts, laws or regulations) you have to fulfill. After that you have to identify proper controls to be implemented. In general, to secure BYOD practices you have to consider the following controls:
- A.6.2.1 Mobile device policy
- A.6.2.2 Teleworking
- A.13.2.1 Information transfer policies and procedures
- A.13.2.3 Electronic messaging
The definition of general roles and responsibilities for information security is made on the Information Security Policy template, which you can find at folder 04 Information Security Policy of your ISO 27001 Documentation Toolkit.
Regarding specific roles and responsibilities for information security, they are defined through all documents in the toolkit. If you note, every time an activity is defined, it is also required the definition of a “Job Title” or person to perform that activity.
You can but you may find yourself in a potential conflict of interest as you as a CISO are in charge of keeping data assets safe and while doing that you will need to take some measures that may be intrusive. On the other hand, as a DPO you will need to ensure that those measures are not infringing the rights and freedoms of the data subjects.
Acciones que surgen de la identificación de riesgos
Respuesta:
No existe ningún nombre específico para esas acciones, sino que se suelen denominar acciones para abordar los riesgos y las oportunidades.
Dentro de las acciones tomadas la organización puede decidir entre varias opciones:
- Evitar riesgos
- Asumir riesgos
- Eliminar la fuente de riesgo, cambiando por ejemplo procesos, materias primas, etc
- Cambiar la probabilidad de que ocurra el riesgo o las consecuencias del mismo
- Compartir el riesgo, por ejemplo con los proveedores
- Mantener el riesgo asumiéndolo ya que su eliminación o mitigación no compensa a la organización.
An organization must decide how to develop processes to make sure that operational control of its environmental aspects is achieved. Among these controls could be included:
- building processes to get consistent outcomes
- analysing the life cycle of a product when putting controls in place
- using technology to ensure results
- ensuring employees are properly trained
- performing processes in a certain way
- monitoring and measuring of results
It is crucial that the organization also considers what parts of your operational control process are required to record as documented information. Controls can include engineering procedures and procedures.