New question:
"Thanks for this information – You’ve answered my Question.
I’ve asked this question as Company 1 is the Head Office and they do the design – Thus Holding the ISO Certificate for Design & Development– Company B is the Sister company which only does repairs and they claim they are not doing design but my argument was that they are redesigning the Original Design down to something else therefore their ISO Certificate should include design even if they use the design engineers at company A but documented Information must be in place.
Do you agree?"
My answer:
If Company B only does repairs, repairs are not considered design. Perhaps one should clarify the meaning of “repairs”, presently I’m working with a company that sell new machines, buy used machines from customers, if both parts agree, and then they repair them and sometimes do changes because, for example, new safety requirements, better components, to sell them as second-hand machines. In tha t case design is a must!
Another important point is: who is ordering the design changes? If they do the design changes but the order with the indications come from Company 1, design is not an issue for Company B.
Controls in third party facility
We received this question:
>I have a further question. Some of the properties and free, public and we do not have a contract. How will this impact your suggestion?
Answer: Without a contract you will not have any support to enforce the properties responsible to implement the security controls you require, and you will be at risk of being legally processed for modifying the facilities to implement the controls by yourself without authorization.
Risk treatment plan
Answer: The Risk Treatment Plan must include actions only to:
- treat risks evaluated as unacceptable (as result of risk assessment)
- improve the performance of already existing controls (based on a top management decision)
Answer: The performing of vulnerability scanning or penetration testing, either by the organization itself or by a 3rd party, are options to be considered only if the control A.18.2.3 (Technical compliance review) is considered applicable as result of risk assessment or because of a top management decision. It is important to understand that vulnerability scanning or penetration testing are only options. If other means, like manual reviews, can fulfill your needs, the performing of vulnerability scanning or penetration testing are not necessary.
Yes! If your organization has not yet performed an internal audit and a management review certification auditors cannot verify that your organization complies with all ISO 9001 requirements.
The following material will provide you information about internal audits:
Answer: For ISO the main standard for business continuity management is the ISO 22301, which defines the requirements for the business continuity management system. For complementary guidance and recommendations there are supporting standards such as ISO 22313 and ISO 27031 (Guidelines for information and communication technology readiness for business continuity)
Other organizations have their own standards that an organization should consider according to its own context, like National Fire Protection Association (NFPA) and its NFPA 1600
2- The requirements state what SHOULD be done and not HOW to do it right?
Answer: Your assumption is partially correct. ISO 22301, like other ISO management standards, has mandatory requirements (associated to the words must/shall) and also optional requirements (associated to the words may/should), and these only define what must/should be done, and not how. This is like this way to allow each organization to freely define how to implement the requirements.
Answer: To change the formula for risk calculation you only have to replace the formula on each cell in "Risk" column, as you would do to change a formula in an excel spreadsheet. The cell are not blocked so you can change the content freely.
To change the values permitted for columns Consequence and Likelihood, please select the cells in the "Consequence" column you want to apply the change to, access the tab "Data" in the main menu, then in Data Tools select the option "Data Validation". In the window that will show you can edit the values permitted for the cells as well as the warning text. Do the same steps for cells in the column "Likelihood".
To change the colours that are displayed automatically based on the r isk level, you have to select the same cells as in the previous explanation and access in "Home" tab the "Conditional Formatting" option, and the the option "Manage rules". From there you can edit the colours according your needs.
Answer: For protection of information flowing through the Internet, and networks in general, the recommended approach is application of cryptography, either to protect the communication channel and the information itself, as well as to authenticate the parties involved in the communication.
2. Once the 'Privacy Policy' is completed this goes online but where do we put our 'Privacy Notice' once completed? Can we send this to our clients via email?
Answers:
1. This depends on what you are going with the comments, for what purpose you are collecting them. So, in order to provide you with an accurate answer would need more details on the reports you are sending and the reason for doing that. Also, do you really need to include the names ? What is the reason behind that?
2. Regarding your Privacy Policy is not necessary that you sent them to your clients you could just inform them about it and provide a link to it. Regarding the “Privacy Notice” according to article 13 of the EU GDPR – “Information to be provided where personal data are collected from the data subject” you need to provide it at the time the information i s collected.
However, if you don`t receive the personal information from directly from the data subject but from another source as per article 14 of the EU GDPR – “Information to be provided where personal data have not been obtained from the data subject” you can provide the Privacy Notices:
- within a reasonable time after obtaining the data, but at the latest within a month;
- if the personal data is used to communicate with the individual, at the latest when that communication is made;
- if the personal data is disclosed to a third party, at the latest when that data is disclosed.
If you obtain that personal data from a third party, there is no need to provide a privacy notice if:
- the individual already has the information;
- providing the information would be impossible or involve disproportionate effort, particularly where the processing
is for archiving, scientific or historical research purposes or statistical purposes;
- the obtaining or disclosure is pursuant to Union or Member State law and there are appropriate measures to protect - the individual; or
- the information is subject to professional secrecy
There is no mention in the EU GDPR on how you should communicate the Privacy Notice so you can use email as well.