Example: HR security domain :-
Evidence required : Approved HR policy document, Roles and responsibility in the table in ISMS, Last 5 onboarded resources with training completed list and offboarded 5 resources list with offboard checklist and data removable certificate, access revoked mail confirmation. etc
Answer: It seems to me that you are making a mistake here.
When performing risk assessment there is no need to list evidences /artefacts. In this step you have to identify which risks are relevant considering the scope of the assessment.
Evidences and/or artefacts regarding the 114 controls from ISO 27001 Annex A are used when you perform either a gap analysis (to identify how many controls you already have implemented) or an audit (to evidence the controls implementation and performance).
Its question-and-answer format allows you to visualize which specific elements of an information security management system are already implemented, and what still needs to be done.
For each clause or control from the standard the checklist provides one or more questions which should be asked during the audit in order to verify the implementation.
I would say you have to conclude for what purpose you need a certificate - if your clients prefers GC Mark better than ISO 22301, then you should go for the GC Mark, and vice versa.
By the way, I've reviewed the GC mark website, and I didn't find a certificate for business continuity.
Benefits of ISO 14001
how does it contribute to the sustainability practices?”
Answer:
The implementation of an environmental management system allows developing a systematic approach to environmental issues in organizations. Beginning with basic assurance of legal and regulatory compliance, and evolving to issues such as alignment between strategy and environment (eg waste reduction, better waste separation and increased efficiency in cost-based strategies, or integration of environmental concerns into design of new products in strategies based on innovation), such as improving the relationship with the neighborhood and avoiding problems with future expansion needs, or such as improving the image before potential clients who value the environmental issues.
The following material will provide you information about environmental management benefits:
Article 5(e) - “Principles relating to processing of personal data” of the EU GDPR states that personal data should be “kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed” (https://advisera.com/gdpr/principles-relating-to-processing-of-personal-data/ ). And this is the only mention about an retention period.
It is up to the controller to establish suitable retention periods unless those are specified in local law. So my advice is to ask someone with a legal background if such obligation exists under Norwegian law and if not, you can keep deleting the chat content every 30 days.
Answer:
Service complaints are, basically, your customer's feedback on service (quality, performance, etc.) or your IT Service Management (ITSM) organization. Therefore, they should be seen from positive side. Customer complain can come in several ways. here are few examples:
1. Through Business Relationship Management (BRM) - BRM is in (business) contact with customer and should be advocate of complaints received by customer
2. Through Service Level Agreements (SLM) - they continually communicate with customer (on operational level) and can also be a channel how customer can communicate their complains
3. Through customer complaint form - use e.g. Service Request for user to submit complaint. Or publish document template on the intranet which users can use to submit complaints.
And one more thing - once you receive complain, it's crucial that something is done and that customer knows that.
Answer: You have to identify the existent controls in the Statement of Applicability even if in the Risk Assessment they are associated to risks identified as acceptable (after all they are implemented and may be the main reason why the risk is low).
2- I'm also a little confused about this:
Documents of external origin:
"Each external document which is necessary for the planning and operation of the ISMS/compliance with GDPR must be recorded in the incoming mail register. The incoming mail register must contain the following information: (1) document number, (2) sender, (3) document name, (4) date of receipt, (5) name of the person to whom the document has been forwarded.
The person who receives mail and courier parcels must forward them to the Information security officer, who must make a record in the incoming mail register; the person who receives electronic mail must forward such a document to [job title], who must also record it in the incoming mail register. The information security officer then classifies documents according to the Policy for handling classified information and determines to whom the document should be forwarded."
This surely needs only to apply to documents from third parties i.e. suppliers who are sending us information about the GDPR/ISO27001 project, however, I don't really see how this would apply to us. We'll email these suppliers asking for clarification, they'll reply and we can log the information, but under what circumstance would they send us mail/physical post? Is this paragraph in here just to cover in case someone sends physical paperwork? Why would it be confidential in anyway? It maybe this just doesn't apply to us as a business and therefore I don't see it's purpose.
Answer: First it is important to note that by third parties you must consider not only suppliers, but also other players such as partners, customers, governments, regulations bodies, etc.
Second point is that even as a SaaS provider, it is extremely rare that an organization can work without documents from external origin being sent through physical media (e.g., official documents from government agencies), and the obligations to track all relevant external documents applies to both paper and electronic documents.
Therefore, you do not need an incoming mail register as a separate document.
Regarding confidentiality, the media on which the information is does not define its confidentiality level, but rather the evaluation of the information owner, then you can have confidential information on physical media if the information owner classifies the information as confidential, regardless the media where it is stored.
Answer: Included in the toolkit you bought there is a List of Documents file that will show you which templates are related to specifically to GDPR, or cover both GDPR and ISO 27001. Form that list you can identify and pick only the documents relevant to ensure compliance to GDPR.