If you only provide telecom services to companies this does not mean that you should only focus on your employee personal data. I am guessing that while providing the service to your corporate clients you would actually have access to some of their persona data as well. In this instance you would be acting as a data processor and your main focus would be to comply with the requirements of the Controller. You also have to have the Inventory of the processing activities that you perform on behalf of the controller as well.
Difference between DPIA and data processing risk assessment
Answer:
If your risk assessment focuses only on the security of personal data then one of the main differences would be that DPIAs focus on the right and freedoms of personal data subjects. You could keep the personal data as safe as you want but this does not guarantee that the data is processed lawfully nor that the data subjects can effectively exercise their rights.
Control gap treatment
Answer: If the gap refers to a standard's mandatory requirement, or to risks considered unacceptable in your risk assessment, it has to be solved at most before the certification audit. Otherwise, its deadline can be defined to a date after the certification, but you have to be prepared to present to the certification auditor the action plan related to the treatment of this gap and any evidence of results already achieved.
Supplier Assessment questionnaire
Answer: There is no specific document for a Supplier Assessment questionnaire (such questionnaire is not mandatory to comply with ISO 27001 requirements), but you can drawn up one based on the Security Clauses for Suppliers and Partners document, since this document lists security requirements that can be put into contract with suppliers and outsourcing partners,and through them you can evaluate how prepared a potential supplier is. You also can take a look at the free demo of our Processor GDPR Compliance Questionnaire at this link: https://advisera.com/eugdpracademy/documentation/processor-gdpr-compliance-questionnaire/
This document can show you how a questionnaire to assess supplier’s compliance with should look like.
Thank you for your answer Andrei. You have made some good points. Have a good day!
DPIA and risk assessment
Answer:
The ISO27K risk assessment is aimed at identifying the risks for companies. However DPIAs focus on the risks to the rights and freedoms of data subject. Another difference is that DPIAs will be a legal requirement as of May next year as opposed to ISO standards that are from a legal perspective strictly voluntary.
DPIA according to EU GDPR
Answer:
It relates to information security to the extend that the personal data is processed by certain IT systems thus those systems need to be secured in order to keep the integrity and availability of personal data. An existing ISMS system would , in DPIA , relate to the technical and organizational measures in place to protect the data.
With this table you can determine options for the treatment of risks and appropriate controls for unacceptable risks. This table also includes a catalogue of options for treatment of risks as well as a catalogue of 114 controls prescribed by ISO 27001.
Our templates are based on ISO 27001 standard, so I also suggest this material to better understand the risk assessment and risk treatment process:
- Book ISO 27001 Risk Management in Plain English https://advisera.com/books/iso-27001-annex-controls-plain-english/
I also suggest you to consider purchase our Risk Assessment Toolkit (https:// advisera.com/27001academy/iso-27001-22301-risk-assessment-toolkit/), so you can have the complete set of documents aligned with ISO 27001 and make the adjustments to integrate them with your already implemented process. We would charge you only the price difference with what you already spent.
Standards for IT procedures and policies
Answer: For definition of IT Security and Operation Security policies complaint with ISO standards you should consider ISO 20000 (for IT service management) and ISO 27001 (for Information security management). By considering these standards, you can develop policies and procedures to ensure proper IT operations and protection of information.
2. My second question is that I am writing new Process document & guidelines for customer.. I am planing to used ISO standard only.
Need help to understand how to write Process & guidelines according ISO standard.