2. Transborder data controller - before we send any data outside the EU, we should have a contract between the customer and us. Does the toolkit have some sample contacts for that issue?
Answers:
1. The document you are referring to can be found in section “7. Third party compliance” of our EU GDPR Documentation Toolkit under the name of “Supplier Data processing Agreement”.
2. The documents you are looking for can be found in section “5. Personal Data Transfers” of our EU GDPR Documentation Toolkit.
Data Portability
Answer:
You need to provide the data subject a copy of the information you have about him basically copies of the documents where their personal data is mentioned.
Regarding ex-employees this needs to be assessed because the emails might me subject to copyright or contain copyright protected information as well as personal data of other individuals and in this case these date need to be removed.
If you are collecting/processing data on your website you would need a Privacy Notice to inform the users as required by EU GDPR art. 13 – “Information to be provided where personal data are collected from the data subject” (https://advisera.com/eugdpracademy/gdpr/information-to-be-provided-where-personal-data-are-collected-from-the-data-subject/). The information about cookies need to be provided as per the requirements of the ePrivacy Decision. As for the ”treatment register” I am not you sure what you mean by that.
I am thinking whether I can approach the Cybersecurity in a risk management framework , from risk management strategy to identify and access the risk , build Cybersecurity program and security assurance architecture , mitigate the risk from Cybersecurity plan with security control in ISO 27001 Annex A against the control category in NIST CSF which comply with NERC CIP 02-09.
and since the correlation between NIST CSF and NERC CIP is already mapped, the integration between these three would follow the same logic.
Risks on software development
Answer: The specific risks perceived by an organization regarding its processes (e.g., software development) and provided services (e.g., CRAM software on a SaaS environment) are unique considering its organizational context and objectives, and should be supported by a risk assessment process, but broadly speaking you should consider these references:
- Top Threats to Cloud Computing Plus: Industry Insights https://cloudsecurityalliance.org/download/top-threats-cloud-computing-plus-industry-insights/
- OWASP Top Ten 2017 Project https://www.owasp.org/index.php/Top_10-2017_Top_10
Respuesta: Los indicadores son muy importantes porque puedes usarlos para medir y monitorizar los procesos y los controles de seguridad de la información, que es un requerimiento en la ISO 27001, de acuerdo al punto 9.1 Seguimiento, medición, análisis y evaluación.
Consider auditing a process – what ISO 9001:2015 clauses do you consider?
Auditing process performance (9.1.1 and 9.1.3);
Auditing process control (8.5.1);
Auditing quality control (8.6);
Auditing nonconformities control (8.7);
Auditing order control (8.4)
Auditing documentation control (7.5)
Auditing monitoring resources (7.1.5)
Auditing identification and traceability (8.5.2)
As you can see, you can use several ISO 9001 clauses to audit a process, outsourced or not.
The following material will provide you information about scope definition:
All the data subject requests including the “right to be forgotten request” would be dealt with according to the “Data Subject Access Request Procedure”.