He recibido esta pregunta:
Estoy haciendo la cuantificación de impactos y tengo el histórico de consumo eléctrico, mi consulta es que si es necesario especificar en algún momento todos los aparatos eléctricos que posee en la empresa?? Realizar algún tipo de inventario detallada con, por ejemplo, detectores de humo, alarmas, computadoras, etc?? o con solo especificar la cantidad de kw es suficiente??
Mi respuesta:
La principal razón para llevar a cabo la identificación de los aspectos ambientales es proporcionar los datos necesarios para decidir qué procesos requieren de un seguimiento y control, y qué procesos se tratan de los mejores objetivos para garantizar unos resultados óptimos en cuanto al impacto ambiental de tu empresa. Cada organización, sin embargo, debe establecer sus propios criterios en cuanto a la significancia, basándose en una revisión sistemática de sus aspectos ambientales y de sus impactos actuales y potenciales. Así que, si crees que identificando cada uno de los equipos y sus correspondientes consumos ayudará a la compañía a determinar qué y dón de tiene que ser controlado el aspecto ambiental, entonces podrías hacerlo.
Para más información, vea"4 pasos en la identificación y evaluación de impactos ambientales ": https://advisera.com/14001academy/es/knowledgebase/4-pasos-en-la-identificacion-y-evaluacion-de-aspectos-ambientales/
Además estos materiales pueden ayudarte en la implementación de ISO 14001 :
- Libro "Preparación para el proyecto de implementación ISO: una guía en un lenguaje sencillo": https://advisera.com/books/preparacion-para-el-proyecto-de-implementacion-iso-una-guia-en-un-lenguaje-sencillo/
- Formación gratuita en línea: Curso de fundamentos ISO 14001 https://advisera.com/es/formacion/curso-fundamentos-iso-14001/
- Conformio (herramienta en línea para ISO 14001): https://advisera.com/conformio/
ISMS and QMS
I am still thinking of implementing the ISMS without QMS is possible (and it is a better approach) and it does not require additional workload. Beside many organization has done ISMS without QMS.
Note: The end goal is to have the system (operations & maintenance) to have its ISMS certified after 2 years in operations.
There is no rush to have it ISMS certified during the development stage.
Question – Thus, I am thinking of doing these steps first even before doing the rest of ISMS activities
1 - I am want to focus to the system requirements – security requirements to design the system to be delivered to the customers. The main input of security requirements will be from risk assessment.
2 - Establishing the context of risk assessment
3 - Conduct the risk assessments, risk evaluation & risk analy sis – thus the risk treatments.
4 - Identifying the all the relevant controls based on ISO 27001 Annex A/ISO 27002
5 - Implement all the security measures and controls in the system design.
6 - Write all the necessary security policies, procedures and guidelines in relations the systems.
7 - Built the system (based on the security requirements), Test and UAT, FAT and deliver.
While doing all the activities above, other ISMS compliance requirements will gradually implemented and done, as we have enough time to get it certified after its being delivered.
Answer: In fact there is no need to implement a QMS to implement an ISMS, although you can take advantage of some practices required by the ISO 9001 standard to improve ISMS performance (identifying and documenting the processes in the scope will help you understand the organization al context and perform the risk assessment). So, it may be a good idea to take a look at ISO 9001 to verify which practices you can adopt now without compromising your current deadline and resources. For more information about this, please see these materials:
- How to implement integrated management systems https://advisera.com/articles/how-to-implement-integrated-management-systems/
- ISO 27001 implementation: How to make it easier using ISO 9001 [free webinar on demand] https://advisera.com/27001academy/webinar/iso-27001-implementation-make-easier-using-iso-9001-free-webinar-demand/
Answer: I'm assuming that for PCI you are referring to PCI-DSS. Considering that:
NIST Cyber Security Framework (CFS) gives you a methodology on how to implement information security or cybersecurity in an organization (in this point it is quite similar to ISO 27001, the ISO standard for Information security management systems).
ISO 27002 is a standard that provides guidelines and recommendations for the implementation of the controls listed on ISO 27001. It differs from NIST CSF in the point it does not establish a system methodology, only practices to be considered when implementing individual controls.
PCI DSS is a standard of data security for the credit card industry, providing a group of mandatory controls to be implemented by organizations that work with credit cards. Like ISO 27002 it does not define a methodology.
I wonder if it is possible to fill in SOA Applicability ''No'' for a certain controls from Annex A/ table A.1, in the situation a risk is Shared with the Company. (e.g. HR security)
Answer: Sharing a risk means some part of the responsibility is divided between the Division and the Company, so you cannot state these controls as not applicable, but you can include observations stating this shared situation.
Answer: ISO 22301 and most regulations and industry practices do not define any specific distance to recovery sites because, as you mention, many factors can affect what would be considered a "safe" distance. From our experience I suggest you to start the discussion suggesting a distance between 30 miles (50 kilometers) and 100 miles (160 kilometers) away from your primary location and from that analyse your organization's context (geographic situation, available resources, required investment, etc.).
You can use the general framework and adapt to your needs. For example, you can change the following information:
- “what ISO 27001 is all about” to “what ISO 22301 is all about”
- “why is it good for the company – and also for themselves” to “why BCMS are good for the company – and also for themselves”
- “what is their role in handling information security” to “what is their role in BCMS”
How much time is needed before IATF 16949 certification
Answer:
Certification can happen fairly quickly once your management system is ready. Usually, the certification bodies define the time needed, and it is from three to six months after the system is implemented (last document is approved and published). Before the certification, you will have to run the full cycle of your QMS, this includes conducting internal audit and management review.
The typical certification process involves an onsite Pre-Assessment if you desire, a stage-1 Readiness Review of your system, the stage-2 Certification Audit itself, closure of any open issues, a review by the registrar, and the issuance of your certificate.
Audit scope
Answer:
There is not a unique correct answer. Each organization should choose the best approach according to its own experience and system. Personally I like to program the internal audits based on the map of processes of each organization, but one can base the internal audits along departments, along clauses of the standard or mixes of these approaches.
Based on the description provided the accounting company only acts as processor on behalf of sole traders and other limited companies.
If we are considering sole traders which are in fact natural persons (data subjects) the EU GDPR would be applicable and the documents found in the EU GDPR Documentation Toolkit https://advisera.com/eugdpracademy/eu-gdpr-documentation-toolkit/ would be useful. For example, data breaches should be notified, according to their severity, to the Supervisory Authority and to the data subjects themselves (the sole traders).
As for the limited companies the situation might differ depending on the type of activities provided by the accounting company. If we are talking about general ledger type activities, s uch as tax calculations, filing tax reports which do not involve personal data the EU GDPR is not applicable. However, if other accounting activities such as payroll for the limited companies employees or calculating tax deductions for employees, are delivered, this would mean that the EU GDPR would be applicable.
As a general remark, due to the fact that the accounting company has only one employee, there may not necessarily be a need to have procedures or complex processes set up in place. For example EU GDPR article 30 requirements (Records of processing activities) are not compulsory for companies under 250 employees which includes accounting companies (although it would be helpful to have it) and the Data Protection Impact Assessments will most likely not be necessary.
Nevertheless the only employee of the accounting company should be informed about the main GDPR provisions - especially the ones referring to personal data breaches and the use of sub-processors (if the accounting company outsources part of its activities to third parties). All relevant information can be found within the EU GDPR implementation toolkit.