If by controlling CUSTOMER (DEBITOR) data you refer to data which relates to a company we can safely assume that this processing activity is out of the scope of the EU GDPR. However is the customer is a natural person (individual) or a sole trader then the EU GDPR would be applicable.
Certifications for ISO 27001 experts
Answer: There are two ISO 27001 personal worldwide recognized certifications available, and both can help you support an ISO 27001 certification process:
- ISO 27001 Lead Implementer – this certification recognizes people who have competency on the ISO 27001 implementation process. For your stated purpose, this one would be more recommended.
- ISO 27001 Lead Auditor – this certification recognizes people who have competency on auditing an ISMS against ISO 27001 requirements and want to become certification auditor (and with this provide more confidence to an organization for being certified).
- ISO 27001 Internal Auditor – this certification recognizes people who have competency on auditing an ISMS against ISO 27001 requirements and want to perform audits only for their organizations.
There is nothing wrong with performing a background check as long as the processing activity is lawful and proportionate.
So, if based on a risk assessment conducted the company, it results that some categories of employees or potential employees would need to be checked, you can do that providing you do the following :
- get the express consent of the potential employee and for the existing employees provide an adequate notice. The consent form template can be found in folder 4 of the EU GDPR implementation toolkit https://advisera.com/eugdpracademy/eu-gdpr-documentation-toolkit/ and the notice for employees can be found in folder 2.
- because this processing activity is quite intrusive (depen ding on the extent of the background check) and special categories of personal data (such as criminal records) might be processed, a DPIA would be required as well. You can find guidance on DPIAs in folder 5 of the EU GDPR implementation toolkit.
Documented information
Answer:
Your question is very particular and I only can give general answers because each case is a case and I don’t have enough information. Nevertheless, I would say that you can eliminate those databases from your QMS intranet. After that you will still control the information about your parts and product list (name, reference, version, change control, approval, distribution, obsoletes).
The following material will provide you information about document control:
A: Business Continuity Procedures (Set of contingencies to minimize potential harm to businesses during adverse scenarios) - A.17.1.2
Would the Business Continuity Strategy and the Disaster Recovery Plan cover this, or there’s a specific document I could use from Advisera for this issue.
Answer: For this draft the Disaster Recovery Plan can help you, but instead of the Business Continuity Strategy template, I suggest you to take a look at the free demo of our Business Continuity Plan template at this link: https://advisera.com/27001academy/documentation/business-continuity-plan/
This template can help you define precisely how the organization will manage incidents in the case of a disaster or other disruption of business, and how it will recover its critical activities within set deadlines.
Answer:
An organization normally has some kind of infrastructure. For example: it can be buildings, utilities, equipments, transportation, hardware and software.
As a good practice, organizations develop maintenance plans to prevent infrastructure failures that lead to production stoppage, non-delivery dates, customer dissatisfaction, overtime, extra-costs of parts and their supply, less reliability and decreased useful lifetime. Usually a maintenance plan includes: infrastructure identification, on which date preventive maintenance will be carried out; who is responsible for doing it; (the same machine can have several types of maintenance done by different people at different times) and what kind of maintenance will be done.
The following material will provide you information about infrastructure management:
Currently there is no requirement for a formal examination to become a GDPR consultant. However, there are many trainings and tools that can help you become a consultant - for example, you can take an advantage of this GDPR Consultant Toolkit: https://advisera.com/eugdpracademy/consultants/
Information classification
1. How to clearly differentiate the cases in which i label the information as vital, working standard, restricted, group restricted, confidential, strictly confidential.
Answer: First of all, regarding your initial comment, you may be confusing the terms classification and labelling.
For information security, information classification means the identification of the value of the information to the organization, and this is generally done based on the results of the risk assessment: the higher the consequences of unauthorized access or disclosure of the information, the higher the classification should be.
On the other hand, information labelling refers to how the people who manipulate the information can quickly identify their classification and thus handle it correctly. For labelling, you can simply include in the label the classification level defined for the information (e.g., include in the header the words "vital", "confidential", etc .), or ,if you do not want identification to be so obvious, you can use a code that only internal personnel will be familiar with (for example, a colour code or number identification).
2. Who is Information Owner? The Head of the department who handles the information flow or the information creator (so the one who writes the document) ?
Answer: If the information is handled by few people or in a centralized way the head of the department would be a better choice to be the information owner, because he is in a better position to ensure the information is protected. On the other hand, if the information is handled by many people or in an decentralized way, the information creator, or the person handling the information, would be a better choice to be the information owner.