Through the above links you can choose a country and search for a suitable location from where you can attend the course.
ISO 27031
Answer: ISO 27031 provides detailed guidance on how to deal with the continuity of ICT elements to ensure that the organization’s processes will deliver the expected results to its clients. It can be used as a tool to implement the technical part of ISO 22301, or the section A.17.1 of Annex A of ISO 27001 standard.
Regarding the deliverables, they will depend on the business impact analysis (when supporting ISO 22301) or the results of risk assessment (when supporting ISO 27001), but in a general manner they will cover these areas:
- Key competencies and knowledge
- Facilities
- Technology
- Data
- Processes
- Suppliers
Not really, it is not a typo. The document is a standard template issued by the EU Commission to be used as a safeguard when sending data outside EU. Moreover, the document should not be altered but only the blanks need to be filled in.
Answer:
It is not a mandatory documented process.
You can’t skip this clause by only documenting risk management/ assessment on your company objective.
Look clause 4.4.1 f) your organization should handle risks and opportunities about your processes
Look clause 5.1.2 b) your organization should handle risks and opportunities about the conformity of products and services.
The following material will provide you information about the risk-based approach:
Answer: Basically you have to implement controls such as top-level Data Protection Policy, Inventory of Processing Activities, consents, Data Protection Impact Assessment, agreements with processors, regulate the transfer of data outside of the EU, etc.
Answer: Considering they have used the same assessment criteria, then you should evaluate the impact of each activity to the business as a whole to make a decision. If both activities have similar impact, then you should rate the laptop as High, to ensure proper controls to the worst case scenario considered in your scope.
Toolkit content
We were looking for documentation templates to assist us with achieving compliance to ISO 27001/27002 and when we were on your website we noticed that there was an additional section for the implementation of EU GDPR documentation. So we took that option.
Looking back now at the pricing web page, could please confirm that the ‘EU GDPR & ISO 27001 Integrated Documentation toolkit’ that we purchased is two distinct work packages or if in fact, I now read the page correctly, it covers an integration of the two standards with both GDPR and ISO 27001 references..
Answer: The "EU GDPR & ISO 27001 Integrated Documentation toolkit" is a single toolkit with templates that cover requirements of both EU GDPR regulation and ISO 27001 standard.
2 - When we look at the references and content within the policy templates it appears to have a focus more on the EU GD PR and not always to the ISO 27001. Is this correct or am I missing something in reading the documents?
Answer: Some templates are specifically for EU GDPR, others specifically for ISO 27001 and a third group of templates cover both EU GDPR and ISO 27001 requirements. Included in the toolkit you bought there is a List of Documents file that can show you which templates cover which requirements from both EU GDPR and ISO 27001.
If you wish, you can schedule a meeting with one of our experts to clarify any elements from the toolkit. To schedule a meeting, please access this link: https://advisera.com/27001academy/consultation/
Performing gap assessment
Answer: Basically you have to ask questions based on standard's requirements, to identify if they are being meet or not.
For example, for requirements such as "The organization shall determine...", the question should be "Did the organization determine...". For requirements such as "The organization shall consider", the question should be "Did the organization consider...", and so on.
This simple questionnaire will help you and your client to visualize which specific elements of a information security management system he has already implemented, and what he still needs to do.
EU GDPR questions
2. How long do we keep the log files for? Also if an unmanaged customer stops the service and asks for deletion of all data and the vps ( I guess we are obliged to delete everything but if that customers was dealing in unlawful activities and the police asks for information we won’t have any to give. (hoe does this work?)
3. If a customer complains about a bridge on their website that is handled by them on a shared hosting platform are we required to have tools that will identify such bridge and from where it came from? Now we use tools to prevent this from happening such as brute force attacks, sql injection etc…
4. Just to add further the data we ask and keep for Billing purposes for the customers is as follows:
Company Name, Contact Name, Address, V.A.T number, Email address
We use the above only for billing and email them for maintenance and invoices. Are the above considered Personal data as all this c an be found on their website? We don’t provide this info to 3rd parties.
Answers:
1. All documents except for the ones in folder 4 “Managing Data Subject Rights” can be used by both processors and controllers so we strongly suggest you go through all of them. Also, there is a document called List of Documents EU GDPR Toolkit where you can find out which documents are mandatory according to the EU GDPR.
2. Regarding the retention period the EU GDPR in article 5 - Principles relating to processing of personal data (https://advisera.com/gdpr/principles-relating-to-processing-of-personal-data/) states that personal data shall not be kept for “ longer than is necessary for the purposes for which the personal data are processed” this means that controllers have to delete the data once is no longer needed for processing unless there is a specific legal requirement that allows them to keep them for longer ( e.g regulatory compliance). As far as your activity as a processor goes the retention periods should be defined by the controllers and communicated to you. If a manages services customer asks you to delete the data you need first to assess if you can comply with the request or not by assessing the local legislation and if there is no reason to hold on to the data for longer you can delete it.
3. Your platform should be designed to prevent and detect data breaches. However, if the data breach originates from a customer is the duty of the customer to detect an report the breach when necessary (EU GDPR article 33 - Notification of a personal data breach to the supervisory authority - https://advisera.com/eugdpracademy/gdpr/notification-of-a-personal-data-breach-to-the-supervisory-authority/; EU GDPR article - Communication of a personal data breach to the data subject - https://advisera.com/eugdpracademy/gdpr/communication-of-a-personal-data-breach-to-the-data-subject/) . If the customer has a breach on their website is their duty to deal with that and notify the appropriate entities, you however, if acting as a processor might be required to assist.
4. The contact name and email address (provided it belong to an individual) on invoices are personal data. Usually invoices have to be kept by companies for regulatory compliance for periods up to 15 years. You should check your local legislation (usually the Tax Code) to see which is the retention period for invoices .
The identification method used in cases of DSARs depends on various factors such as the information you hold about the data subject as well as how the DSAR was received.
For example, if the data subject sends the request via email and the email is already in your database as it was provided by the data subject you can safely assume that the data subject is the one sending the email. If you receive the request via telephone you can just ask the data subject some ID verification questions same as banks do such as ( the last recorded address, the social security number, etc.).
One easy way is to establish a set of identification questions to be used to check the ID of the data subjects whenever a request is received. If the request comes form another person then the data subject you need to ask for a authorization from the data subject by which he empowers anoth er party to submit a DSAR on his/her behalf.
To learn more about how to handle DSARs you can book a seat at our webinar - Data Subject Rights under the EU GDPR - https://advisera.com/eugdpracademy/webinar/data-subject-rights-under-the-eu-gdpr-free-webinar-on-demand/
You can also check out our EU GDPR Foundations Course https://advisera.com/training/eu-gdpr-foundations-course/