Products must be safe and comply when they are available for supply, or 'placed on the market'. This occurs when a manufacturer first makes the product available for further supply or when an importer takes ownership of the goods once they have been cleared by customs.
What is safe is determined by considering all characteristics of the product, how it is presented, the effect that it might have on other products it is likely to be used with and the consumers at risk when using it.
For many product sectors there is specific safety legislation (covering, for example, electrical goods and machinery), which sets out more detailed safety requirements applicable to those products. This legislation generally applies to both consumer and commercial products, but sets out the same safety criteria.
Confidentiality is usually determined by the customer. Some customer may require that documents or processes the organization perform to provide the product are under confidentiality agreement and cannot be presented to other parties.
Based on the customer requirements,the organization needs to determine whether it is capable to provide demanded product in therms of quality and quantity. It can be done through validation of manufacturing process, benchmariking studies or other methods.
4. Internal audit programme (9.2.2.1)
The IATF 16949 requirements for the audit program ask that you plan, establish, implement, and maintain an audit program, meaning that you need to have an ongoing program in effect.
The following information should be included in the program:
- Audit frequency
- Audit methods
- Responsibilities
- Requirements for planning
- Criteria for the audit
- Scope of the audit
- Audit reporting
Organizational knowledge - Clause 7.1.6 of ISO 9001:2015
Answer:
Clause 7.1.6 of ISO 9001:2015 basically has two parts. The first one is about the knowledge necessary for the operation of processes and to get conforming products and services. For each process ask yourself what kind of knowledge each participant in a process need to perform proficiently each activity and to make good decisions.
The second part is about new knowledge to address changing needs and developments in know-how or market conditions, for example. Is like defining a radar of knowledge to watch and monitor in order to discover the new.
During the first audit (Gap Analysis) for the standard (22301) it seemed that the alternative site is a must
Answer: No. An alternative site is not mandatory by ISO 22301, but what may happen is that the results of your business impact analysis may point out that your organization should consider it as a strategy to ensure business continuity in specific disaster scenarios.
In cases like these, if your organization decide to not adopt an alternative site as a business continuity strategy it should record this decision and the criteria adopted to support it.
“An IT services organisation having contracts with customer for both onshore and Offshore work. The BCP that organisation has is primarily focused on the services being rendered from Offshore sites.” My questions are
1 - Does Onshore work also need to be cover? I have always been of the opinion it should not as service organisation does not have control on resources of Client onsite locations. Please clarify
Answer: According ISO 22301, the decision to include or not a service or process in the business continuity scope is up to the organization, that has to consider:
- its business objectives;
- legal requirements and contracts it has to fulfil;
- costs involved in implementing business continuity;
- potential losses related to disruptive events; and
- that any exclusion made will not affect the organization's ability and responsibility to ensure business and operations continuity.
So, if after considering all these issues you find no reason to include your Onshore work op eration on the BCMS scope, it does not need to be covered by the business continuity management system,
2 - When client facility or network not available there is a possibility of Service organisation losing revenue due to the disaster at Client location. This has billing impact on service organisation. What is the way forward for such situation?
Answer: If I understood well, you're asking what kind of business continuity strategy to develop if your client has a disruption - since you are completely dependent on this client in such case, the best strategy is not to have only a few big clients, but several smaller clients. That way you will decrease the risk of drop in revenue if one client is affected by a disaster.
Controls selection
Answer: Considering your example the ISO 27001 controls that you should consider are:
- Control A.9.3.1 Use of secret authentication information (this control provides orientation on how to store secret authentication information)
- Control 9.2.3 Management of privileged access rights (this control provides orientation on how secret authentication information should be maintained when shared)
Thanks but I was referring to the actual threat 'events' in the threat & vulnerability catalogue, i.e. is there a definition anywhere of what constitutes the difference between for example 'unauthorised access to info systems' opposed to 'access to network by unauthorised persons' or 'info leakage' opposed to 'disclosure of info' etc., etc.
2 - Would you also be able to point me to organizations that may be looking for trainee ISO 27001 auditors to help me acquire the experience I need to become certified?
Answer: Unfortunately that's a difficult question to provide you an answer, because most of the main certification bodies already have their auditors, and always there are more people looking for opportunities than openings for new auditors.
Risk Treatment Plan and audit
Answer: I'm assuming that for RTP you are referring to Risk Treatment Plan. Considering that, the answer is no, you can leave some of the controls for the implementation for after the auditing under the following conditions:
1) That you have implemented before the audit the controls that mitigate the biggest risks – in other words, you can leave only less important controls for after the audit
2) That you have specified the deadlines for the controls that you will be implementing after the audit in your Risk Treatment Plan – of course, those deadlines must be after the audit date
3) That your risk owners or top management accept all the risks for which controls have not been implemented before the audit
This means that the most important controls must have ”implemented“ status at the audit, while the less important controls can have status ”planned“ or ”partially implemented" at the moment of the audit. Of course that for controls with status of ”partially implemented" you have t o keep evidences of activities already performed regarding the implementation (the auditor won't audit the control, but he will verify if the implementation plan is being executed).
Shall and should in ISO 27001 standard
Answer: In the ISO standards development, the word "shall" is related to requirements, which are mandatory to be fulfilled, while the word "should" is related to recommendations, which fulfilling is optional.
ISO 27001 provides requirements for the implementation of an ISMS, which are mandatory to be fulfilled for certification (all controls in Annex A deemed as applicable must be implemented). On the other hand, ISO 27002 was designed to be used as support to ISO 27001, or as a separated standard to support the implementation of security best practices, without enforcing them. That's why ISO 27002 replaces the word "shall" by "should"in the description of the controls objectives.
This article will provide you further explanation about the differences between ISO 27001 and 27002: