Answer: If the gap refers to a standard's mandatory requirement, or to risks considered unacceptable in your risk assessment, it has to be solved at most before the certification audit. Otherwise, its deadline can be defined to a date after the certification, but you have to be prepared to present to the certification auditor the action plan related to the treatment of this gap and any evidence of results already achieved.
Supplier Assessment questionnaire
Answer: There is no specific document for a Supplier Assessment questionnaire (such questionnaire is not mandatory to comply with ISO 27001 requirements), but you can drawn up one based on the Security Clauses for Suppliers and Partners document, since this document lists security requirements that can be put into contract with suppliers and outsourcing partners,and through them you can evaluate how prepared a potential supplier is. You also can take a look at the free demo of our Processor GDPR Compliance Questionnaire at this link: https://advisera.com/eugdpracademy/documentation/processor-gdpr-compliance-questionnaire/
This document can show you how a questionnaire to assess supplier’s compliance with should look like.
Thank you for your answer Andrei. You have made some good points. Have a good day!
DPIA and risk assessment
Answer:
The ISO27K risk assessment is aimed at identifying the risks for companies. However DPIAs focus on the risks to the rights and freedoms of data subject. Another difference is that DPIAs will be a legal requirement as of May next year as opposed to ISO standards that are from a legal perspective strictly voluntary.
DPIA according to EU GDPR
Answer:
It relates to information security to the extend that the personal data is processed by certain IT systems thus those systems need to be secured in order to keep the integrity and availability of personal data. An existing ISMS system would , in DPIA , relate to the technical and organizational measures in place to protect the data.
With this table you can determine options for the treatment of risks and appropriate controls for unacceptable risks. This table also includes a catalogue of options for treatment of risks as well as a catalogue of 114 controls prescribed by ISO 27001.
Our templates are based on ISO 27001 standard, so I also suggest this material to better understand the risk assessment and risk treatment process:
- Book ISO 27001 Risk Management in Plain English https://advisera.com/books/iso-27001-annex-controls-plain-english/
I also suggest you to consider purchase our Risk Assessment Toolkit (https:// advisera.com/27001academy/iso-27001-22301-risk-assessment-toolkit/), so you can have the complete set of documents aligned with ISO 27001 and make the adjustments to integrate them with your already implemented process. We would charge you only the price difference with what you already spent.
Standards for IT procedures and policies
Answer: For definition of IT Security and Operation Security policies complaint with ISO standards you should consider ISO 20000 (for IT service management) and ISO 27001 (for Information security management). By considering these standards, you can develop policies and procedures to ensure proper IT operations and protection of information.
2. My second question is that I am writing new Process document & guidelines for customer.. I am planing to used ISO standard only.
Need help to understand how to write Process & guidelines according ISO standard.
Answer: You understanding is correct. Complicated procedures are prone to errors and the impacts you mentioned, and depending upon the results of your analysis and evaluation the application of security controls may be required.
How about a self assessment? You could use the "EU GDPR Readiness Assessment" and besides the answers also gather documentation to prove compliance. By the way, you should be able to answer Yes to all questions applicable to you. You could also engage a third party to perform an audit. The audit should focus both on processes and documents with a special focus on your Inventory of processing activities and DPIAs.
Also bear in mind that no body as of yet can certify that you are GDPR compliant. Certification bodies are yet to be established.