The template can work for website privacy notices as well. Just bear in mind that the website privacy notice may be different than other privacy notices if you collect other personal data such as IPs for example. You can have different privacy notices for different processing activities such as or your customers, website visitors, employees, etc.
Document controlling is what clause 7.5 of ISO 9001:2015 speaks about when it mentions documented information.
Clause 7.5.2 is about document creation – you want clear documents, consistent format and authorized approval and review
Clause 7.5.3.1 is about how to assure access to the documents to those that need to use them and how to protect them from loss of integrity and misuse
Clause 7.5.3.2 is about versions change control and about controlling records
The following material will provide you information about documented information:
Yes, you are. Objectivity is an important issue when we speak about audits. Do not forget other issues like training about the standard and training about internal audits.
The following material will provide you information about the internal audits:
Considering your strategic orientation your organization will determine relevant internal and external issues.
As an example of internal issues, you can have:
Quality problems;
Low productivity;
Delay problems;
New subcontractor.
As an example of external issues, you can have:
Raw materials price evolution;
New legislation that will affect what your customers, or your customers’ customers will buy;
New technology that will affect how you manufacture, or how you sell;
New consumer trends that will affect demand quality and volume.
With this kind of issues in stake, we can look at them also as uncertainty generators. And risk is the effect of uncertainty on expected results.
Quality problems, low productivity and delays can be viewed as the manifestation of risks. If your organization want to reduce the probability or frequency of those risks one good way to accomplish that is to change, to improve the processes where those risks are generated
New consumer trends are an external issue that can be viewed as a risk, or an opportunity, perhaps your organization can focus production on a particular category where demand is increasing, and you have a competitive advantage. Do you need to make changes in the production? Or in the commercial approach to the market? Do you need changes in how to buy, or whom to subcontract?
The following material will provide you information about the context and risks:
I'm understanding that in your context the P.A.R./C.A.R. is considered relevant and/or mandatory to be used, regardless of the ISO 27001 requirements.
If this is the case, then you can use the PAR to handle the implementation of the controls (it will be your Risk Treatment Plan).
The CAR can be used to handle security incidents or non conformances identified in audits, but not security threats (if the threat did not occur you should use the PAR).
Again it is important to note that CAR and PAR documents are not required by ISO 27001 and this approach works as a mean to integrate ISO 27001 practices to your working framework.
Required GDPR documentation
Answer:
By the looks of it you are engaged in processing activities of both your employees as well as your customers. As you are a controller in both instances there are quite an extensive set of requirements that you need to comply with to achieve compliance with the EU GDPR and avoid the hefty fines. There are several record you may need to keep as required by the EU GDPR such as the “Inventory of Processing Activities” as well as records of your customer consents and if it comes to it you need to keep records of your personal data breaches.
The EU GDPR in art. 23 – “Security of processing” (https://advisera.com/eugdpracademy/gdpr/security-of-processing/) mentions encryption as a means to protect personal data. It also mentions that “appropriate technical and organisational measures “ need to be taken according to the risks involving a specific processing activity.
So, basically is up to the controllers and processors to determine which security measures they need to take. Coming back to the question whether an email should be encrypted or not you would need to think about the content of your emails. Basically emails that contain large amounts of personal data should be encrypted as well as emails containing sensitive personal data.
Answer:
The AS9100 Rev D standard, as with the ISO 9001:2015 standard, does not state what is required for auditor competence for internal audits. So, as with all processes it is up to the company to define what the competences are for the internal auditors. If you define your competency as “having taken an AS9100 Rev D Internal Audit Training Course” then having taken an ISO 9001:2015 internal audit training course will not be sufficient.
However, if you define your competencies as 1) understanding AS9100 Rev D, 2) Understanding process auditing, and 3) understanding the internal processes to be audited then you need to find a way to address each of these competencies. As process auditing is the same in ISO 9001:2015 and AS9100 Rev D then having the competence to audit is covered and all you need to fulfill is the competence to understand the AS9100 Rev D standard.
For an understan ding of what is included in AS9100 Rev D see this whitepaper: https://info.advisera.com/9100academy/free-download/clause-by-clause-explanation-of-as9100-rev-d
Log monitoring and review
NOTE : 'Control 12.4 Logging and Monitoring' has been marked applicable in the Statement of Applicability.
Answer: By monitoring you are collecting and recording information about specific events, while review refers to a critical evaluation of the gathered results (and sometimes the set of data can show relevant information that cannot be seen from isolated events), so these are different actions, and control A.12.4.1 (Event logging Control) requires not only log recording, but also the review of the collected data.
Answer: The scope statement should be known by the personnel who:
- handles the information the ISMS is intended to protect;
- work on the locations included in the ISMS scope;
- work on the processes described in the ISMS scope
Additionally, personnel that may affect or be affected by the ISMS (e.g., customers, suppliers, regulators) should be informed about the content that are relevant to them.