Answer: There is no experience requirement to attend an ISO 27001 lead auditor course (although previous experience will help you in some aspects). The experience is only required if you want to become a lead auditor working as a certification auditor.
Answer: CISA and Lead Auditor cover different fields (information on systems are only a small intersection between them), so does not make much sense to compare demands between them. Your choice between them should be based on the type and depth of the activities you desire to perform. If your want to focus on information security management, you should consider ISO 27001 Lead Auditor. If you want to go beyond the scope of information security, and also consider the strategic relationships between information security and the information systems and business objectives you should consider CISA. Please note that these courses do not exclude each other, they only offer different perspectives about how information interacts with business.
Another alternative you should consider is the Lead Implementer course.
Respuesta: Disculpa, pero no estoy seguro si he entendido bien tu pregunta, porque la lógica de la ISO 27001 es identificar riesgos, y tratarlos, implementando los controles de seguridad que sean necesarios. Por tanto, básicamente los controles que pueden no ser obligatorios son aquellos que no necesitas para tratar los riesgos identificados, por ejemplo porque no son aplicables. Por ejemplo, si en tu organización no exise el teletrabajo, el control relacionado con el teletrabajo no será aplicable, y por tanto no será obligatorio implementarlo. Este artículo te puede resultar interesante “La lógica básica de ISO 27001: ¿cómo funciona la seguridad de la información?” https://advisera.com/27001academy/es/knowledgebase/la-logica-basica-de-iso-27001-como-funciona-la-seguridad-de-la-informacion/
To what extent should we use Annex 2 of the Cross-Border Data Processing Procedure for:
- the application of visas for countries such as America, India, China, etc.? Consulates will not be prepared to sign Annex 2.
- the reservation of hotels, renting cars in e.g. the above-mentioned countries?
Answer:
1. If you apply for visas you don`t need to have a data transfer mechanism in place as the transfer of data is regulated via International Agreements between countries.
2. If the data subject does that directly there is no need for such data transfer agreement. However, if a company in the EEA would be passing personal data to a car rental company outside the EEA a data transfer agreement would be needed between the two entities.
Yes, they were. Before ISO 9001:2000 there were three quality assurance standards: ISO 9001 for a company with design, commercial and production in the scope, ISO 9002 or a company with for a company with commercial and production in the scope, and 9003 basically for a company without neither design nor production, just commercial activity.
The following material will provide you information about standards history:
I recommend you concentrate on the areas with the most important changes in the 14001:2015 version. Particularly risks and opportunities; context of the organization, interested parties and the life cycle consideration during the identification of environmental aspects.
GDPR Application in Case of EU Nationals Living Outside UAE
Answer:
My guess is that the EU GDPR is not applicable in your case since you are not offering goods or services to individuals in the EU.
The EU GDPR will only apply to personal data regarding individuals within the Union, while the nationality or habitual residence of those individuals is irrelevant. For example, a company based in the EU which is processing the data of Japanese individuals located in Japan will still need to comply with the EU GDPR. Consequently, the Japanese individuals will be benefiting from all rights according to the EU GDPR, even if these rights do not exist in their own nation’s laws.
When the data of EU citizens is processed outside of the EU by companies which are also outside the EU, then this is not cons idered to be “in the Union”. For example, the EU GDPR will not be applicable for a school which is based in the United States just because there is a possibility that one or several of its students would be EU citizens. In this case the processing does not take place “in the Union,” nor is the individual “in the Union”.
2. What do you mean by “substantially affects” in alternative b) I can’t really see that there is a requirement that our head office located din Norway would need to have a cross border agreement to process data for our employees located on branch offices within EU such as UK, Netherlands, Sweden.
Answer:
1. If you are transferring personal data to a third party located outside the EEA than this is consistent with a cross border data transfer and certain safeguards such as Standard Contractual Clauses (SSC) need to be in place in order for the transfer to be consistent with the EU GD PR requirements.
2. As mentioned above transfers to countries which are within the EEA is not considered a cross border transfers thus, there is no need for the SSCs or other safeguards.
Assessing data breaches
I'm trying to figure out what this means - when we should or shouldn't notify customers.
The sort of data we typically have is:
- IP address
- Full name
- Email
- Home address
- Work address & name of work (sometimes)
- Purchase history (we sell clothes)
- Other less interesting things such as what pages have been visited, which marketing emails have been opened, etc.
Based on my limited understanding, the most sensitive information we have is a customers's size data. If we leaked, say, 100,000 records it may directly or indirectly contain information on someone's size. Can you help clarify this?
Answer: I think you will find an answer to this if you read our “Assessing the severity of personal data breaches according to GDPR” (https://info.advis era.com/eugdpracademy/free-download/assessing-the-severity-of-personal-data-breaches-according-to-gdpr). This document will provide you with a simple “out of the box” methodology to asses your data breaches.