You don´t need to keep separately the quality policy for ISO 17025 and ISO 9001. What is mandatory is to maintain documented information of the quality policy for both standards, so it doesn´t matter if you do it separately or you have only one document.
>I am fully satisfied with the answer for loading & unloading area. I do understand what the standard says but how to make it from scratch? So just consider any office, and I have to make a new loading & unloading area.
Answer:
Once you already have the requirements for this new area, you have to assess your office to verify if you have any environment (e.g., an room or free area) available that can fulfill them (the most restrictive ones will be those related to an isolated environment and the existence of internal and external doors, because all others are related to actions and signalization).
If you now do not have such available area you will have to build one (if this control is considered applicable). In this case you will have to include these requirements to the responsible to build this new area, so you can ensure it will fulfill control A.11.1.6.
Toolkit selection
From your experience, what is the best way to approach this project? We are also looking at purchasing your tool kit and was wondering if we should purchase on the ISO 27001 toolkit or to buy the EU GDPR/ISO 27001 toolkit despite our certification requirement is for only ISO 27001 considering the price difference for future sake.
Answer:
The main question here is if the US facility has to handle EU citizen's data, or will handle it in the near future. If the US facility does not have access to EU citizen's data, and does not expect that for the near future, you can reduce its scope only to ISO 27001 and US legal requirements. Implementing integrated standards/regul ations is more complex, and you should avoid such implementations whenever possible.
Regarding the toolkits, I'd suggest you to buy the EU GDPR/ISO 27001 toolkit https://advisera.com/eugdpracademy/eu-gdpr-iso-27001-integrated-documentation-toolkit/, because this one has all documents you will need to fulfill both ISO 27001 and EU GDPR, and you can use only the ISO 27001 related documents to implement ISO 27001 in your US facility.
Evidenciar el contexto de la organización
Respuesta:
Siempre es recomendable realizar la determinación del contexto de la forma más sencilla posible, por ejemplo organizando una tormenta de ideas con el personal relevante de la organización y llevando a cabo un análisis DOFA (debilidades, oportunidades, fortalezas y amenazas). El acta de reunión que incluye este análisis sería suficiente para evidenciar que se ha llevado a cabo la determinación del contexto de la organización.
Auditoría interna y control/evaluación de proveedores
Como se hace en ese caso, de qué manera verificar los requisitos que establece la norma que tienen que ver con esos departamentos.?
Respuesta:
En ese caso la organización cuenta con varios proveedores externos que realizan los servicios de diferentes áreas de la organización. La cláusula 8.4.1 de la norma ISO 9001:2015 establece que los proveedores externos sean controlados y que su desempeño sea evaluado, por tanto esto es lo que debe ser auditado en la organización: el control y la evaluación de los proveedores externos.
Uno de los métodos para llevar a cabo el control de los procesos subcontratados es que en el contrato con el proveedor la organización establezca mediante información documentada (por ejemplo procedimientos o instrucciones de trabajo) las funciones, responsabilidade s, informes consecuencias, etc. A su vez la organización debe de contar con una serie de criterios para la selección de sus proveedores, como la calidad del envío, el precio, los términos de pago, etc.
Otra opción para el control de proveedores puede ser mediante un proceso de auditoría por una segunda parte. En este caso la lista de verificación o checklist tiene que ser acordado y aprobado por ambas partes, la organización y el proveedor.
Please check the last paragraph of Annex A.3 of ISO 9001:2015. It is up to each organization to decide if a certain entity is an interested party or not. Considering a certain entity or group as an interested party is not a technical decision, it is a management decision. Different organizations in a same economic sector can have different sets of interested parties due to different strategic orientations.
If you consider a certification body as an interested party I would consider the contract or agreement with them as the source of their requirements. Revision could be done when going for recertification or after some request to change the contract or agreement.
The following material will provide you information about interested parties:
Answer: Very often, for efficiency reasons, only information classified as high sensitive is labelled (ISO 27001 is not prescriptive about which information to label, so this is an organization decision), and in such scenarios information that is not highly sensitive is not labelled.
Regarding what you need to label, you must include all documents within the ISMS scope, i.e., the information you want to protect and documents related to the isms, regardless of the media it uses (if the same high sensitive information is on electronic and physical media, both media must be labelled).
>I am reaching out to you for the clarification of maintenance again. Please refer to my certificate. It says it is valid for 3 years. I understand we don't need to renew it but the details on the certificate say otherwise. Can you please help me to understand if I am missing something?
Answer:
This period mentioned in the certification is related for how long this certificate can be used in the process to become an certification auditor. Since you have been approved in the exam by 2016, this certification is valid until 2019, to be used to fulfill one of the requirements to become a certification auditor. After 2019 you to take another exam to have a valid certification for this process.
2. Is there a template for Information related to information security objectives at relevant functions and levels, as required in clause 6.2?
Answer: You can use our Statment of Applicability template to define the objectives for your ISMS and the Measurement Report template to summarize the measurement methods, the frequency of measurement, and the results.
3. Is there a template for plans to achieve the security objectives, as required in clause 6.2, must have been determined (at least for the majority of the security objectives defined)?
Answer: The security objectives are achieved by treating the risks that can affect them. Considering that, you can use our Risk Treatment Plan to to determine precisely who is responsible for the implementation of controls, in which time frame, with what budget, etc.
4. Is there a template that identifies the Needs and expectations of interested parties, as mentioned in clause 4.2?
Answer: You can use our List of legal, regulatory and contractual requirements template to identify and document the requirements of interested parties.
The return of assets control has the objective to ensure the return of all organizati onal assets in the possession of employees or contractors upon termination of their work relationship. Considering that, you must include in your list all assets of the organization that are in their possession, that can pose an unacceptable risk to information security. Regarding personal assets, it is important to record them so you can know where your information, may be stored. When personnel is leaving the organization you should check if all organizational assets were returned, and if information on personal devices were deleted.
The application of this control may be tricky in organizations where personnel often use their own equipment, due to privacy questions, or the organization has several mobile equipments, so you should consider defining clearly who and in what circumstances of personnel is responsible for assets that can easily be moved out of organization's premises.