Warning: A non-numeric value encountered in /www/expertadvicecommunity_719/public/wp-content/plugins/advisera-press/includes/App/Repositories/Topic/TopicRepository.php on line 602 Search results for:
Answer:
First of all, just to state that ISO 9001 and LEAN it is not an either/or choice; both can be used.
An organization can pick ISO 9001 because it is a customer requirement because it’s lack is a barrier to start working with new customers, because it is a way of reducing variability in organizations, because it is a way of a creating a continual improvement culture. LEAN methodologies can be a way of implementing the continual improvement mentioned in ISO 9001 because it is a way of identifying and systematically eliminate/reduce waste in organizations.
Answer:
There are many companies around the world that create and issue standards, two of these are the British Standard Institute (BSI) and the International Organization for Standardization (ISO). ISO has issued the ISO 45001 standard, and BSI had issued the OHSAS 18001 standard. While the ISO organization has countries from around the world vote on the standards it releases, an organization like BSI does not. As such, the ISO standards are recognized around the world as the best practice in the international community. By comparison, the BSI standards are recognized by some countries but not others.
For a comparison of what will happen it is helpful to loo k at the ISO 14001 standard. This was also a different BSI standard before it was adopted by ISO. Once the ISO standard was issued the BSI standard was made obsolete shortly after the fact and no longer updated. The same thing is expected to happen here, the ISO 45001 standard has become the internationally recognized standard, and BSI will make the OHSAS 18001 standard obsolete, at which time certification bodies will not audit against this standard and OHSAS 18001 will not have any other releases. There has been no merger of companies, just that the standard for occupational health & safety is now internationally recognized in ISO 45001. The BSI organization does much more than just maintain standards, and will continue to exist for many other reasons.
Answer:
Management system standards issued by ISO, like every other standard, have a review period. The review period is around 7 years.
This standard represents mutual best practice in the field of automotive industry, as the industry is moving forward very fast standard must adapt and put the level of quality requirements higher.
There is always a transition period of 3 years, so organizations have to comply until 2019 with new IATF 16949:2016.
Organizations have to comply with the new version of the standard since the old one is not valid after the transition period. If the organization is certified against the old version of the standard (ISO/TS 164949), this certificate will not be valid anymore.
2. What is the difference?
Answer:
Like every new version, the standard has new requirements and it is following Annex SL structure.
To find out more information please feel free to look at the following materials:
- IATF 16949:2016 vs. ISO/TS 16949:2009 Matrix: https://info.advisera.com/16949academy/free-download/iatf-16949-2016-vs-iso-ts-16949-2009-matrix
- Key benefits of IATF implementation: https://advisera.com/1699academy/knowledgebase/key-benefits-of-iatf-16949-implementation/
- ISO/TS 16949:2009 vs. IATF 16949:2016 Conversion Tool: https://advisera.com/16949academy/isots-169492009-vs-iatf-169492016-conversion-tool/
Risk assessment
1. Identify risk (Threat and vulnerability) is responsible by asset owner? If true, how do they identify?
Answer:
The asset owner is responsible for protecting and managing an asset in a company, so he has to ensure risks are identified, either by performing risk identification by himself or by working with other people (e.g., experts on the asset or people who use them on a daily basis). Since ISO 27001 does not prescribe who must perform risk identification, both approaches are valid, and you have to consider your organization context (e.g., asset owner experience and knowledge) to chose the proper approach.
2. Assessing consequence and likelihood of risk is responsible by risk owner?
Answer:
Risk owner is a person designated to solve a risk, and to do so he must be responsible for performing consequence and likelihood assessment, either by himself or with support of other personnel.
3. So for the one who is responsible for Risk assessment just pick up from them and then do the risk assessment?
Answer:
Risk assessment is the combination of risk identification, risk analysis and risk evaluation, so it is not a simple question of picking up risks, but identify them, define values for them, so they can be prioritized, and evaluate them against your criteria, so you can decide which ones have to be treated.
The following appears to be missing from our folder:
A.5– Information Security
A.18– Compliance
Answer:
First of all, sorry for this confusion.
The documents from sections A.5 and A.18 are not missing from the toolkit – you can find them here:
- A.5 – all the documents from folder “08AnnexA” cover the requirements about information security policies (A.5.1.1) and review of the policies (A.5.1.2)
- A.18 – these documents are covered in the toolkit in folder "02 Procedure for identification of requirements”
ISO 20000 and ISO 9001
Answer:
I assume - you will implement ISO 9001 and then ISO 20000. Yes, implemented QMS can help you. There are some common elements and there are some that are extended in ISO 20000 (after you implement ISO 9001).
Answer:
That depends on many parameters, but generally, here are more details (without knowing your organization, services, etc.).
First of all, see how many people you need on your 1st line. Then try to avoid to put your best people (usually most expensive and most usable on other, more complex places) if your 1st line is doing simple activities (opposite view if your support is complex in nature). Check also if you can afford to have a lot of resources dedicated to the services (e.g. few maintenance contracts). If you have a lot of issues with unknown root cause (Problem Management) - most probably you'll need more resources on 2nd level.
If you create the accounts an not the employees themselves, then this may be a transfer of personal data provided that the employees are in the EU. However, most of the cloud providers already have transfer mechanisms in place. For example, DropBox has a Privacy Shield Certification (https://www.dropbox.com/help/security/data-transfers-europe-us ).
Filling out the Treatment Table
First of all thanks for the clarification about your doubt.
In fact for the purpose you described, the Risk Treatment Plan is not the proper document. As you said, it describes the general solution for risk. For recording more detailed information you can use the Statement of Applicability template. In this template you have a column called "Implementation method ", where you can describe the solution for a control (covering all risks and legal requirements related to that control), or make reference to documents (e.g., policy, procedure, or work instruction) describing the adopted solution.
The concept of measurement is also best explained through this PDCA cycle:
In the Plan phase you need to set the objectives (ISO 27001 4.2.1 b 1) and 4.2.1 g),
In the Do phase you must figure out how to measure up to which point your objectives are achieved (ISO 27001 4.2.2 d),
In the Check phase you need to start actual measurement (ISO 27001 4.2.3 c), and finally
In the Act phase, once you realized you haven’t achieved your objectives (which is very often the case), you need to make certain improvements (ISO 27001 4.2.4 d)
However, I was unable to get the section in actual ISO 27001 standard which you mentioned as
4.2.1 b 1) and 4.2.1 g)
ISO 27001 4.2.2 d
(ISO 27001 4.2.3 c),
(ISO 27001 4.2.4 d)
Answer:
First of all, sorry for this inconvenience. This article was written considering version 2005 of ISO 27001. For version 2013 you must consider these clauses:
ISO 27001:2005 4.2.1 b 1) is now ISO 27001: 2013 5.2 Policy
ISO 27001:2005 4.2.1 g) is now ISO 27001: 2013 6.1.3 Information security risk treatment
ISO 27001:2005 4.2.2 d is now ISO 27001: 2013 9.1 Monitoring, measurement, analysis and evaluation
ISO 27001:2005 4.2.3 c is now ISO 27001: 2013 9.1 Monitoring, measurement, analysis and evaluation
ISO 27001:2005 4.2.4 d is now ISO 27001: 2013 10.1 Nonconformity and corrective action and 10.2 Continual improvement
Warning: A non-numeric value encountered in /www/expertadvicecommunity_719/public/wp-content/plugins/advisera-press/vendor/jasongrimes/paginator/src/JasonGrimes/Paginator.php on line 154
Warning: A non-numeric value encountered in /www/expertadvicecommunity_719/public/wp-content/plugins/advisera-press/vendor/jasongrimes/paginator/src/JasonGrimes/Paginator.php on line 214
Warning: A non-numeric value encountered in /www/expertadvicecommunity_719/public/wp-content/plugins/advisera-press/vendor/jasongrimes/paginator/src/JasonGrimes/Paginator.php on line 217