You only have to scroll down the screen a little to find the free demo tab.
Corrective action process
1 - Is it an expectation that anyone within the organisation can complete a corrective action form? Or should it be directed through a central location e.g. the service desk for them to complete?
Answer: the standard only requires that corrective actions are performed when needed after a nonconformity is encountered. How to handle a corrective action is an organization decision, and both approaches you mentioned are valid ones. You only have to ensure that people who handle a corrective action are properly trained in doing so and that results of any corrective action are retained as documented information .
2 - Would it be appropriate to post the form on our intranet and direct all our people to it for them to complete and then submit the form?
Answer: In terms of the standard this point is indifferent (this is another "how" situation, and the standard only defined "what" must be done), but for an organization's operational purposes this is a good idea, because it makes easier to find the form.
3 - Presumably this is to evidence continual improvement?
Answer: Yes. Together with evidences of implemented opportunities for improvement, documented information about corrective actions are evidences that the management system is being improved over the time.
All the risks that affect the QMS and the organization need to be addressed, regardless of the fact that the company faced them earlier. If these, let's say, old risks haven't been addressed properly and they still exist, they should be addressed again.
The way of dealing with the risks is to define actions to address the risks. You need to define what needs to be done, who will do it, what resources are needed and what is the deadline for the action.
The risks can be turned into opportunity, but the opportunity itself is perceived only as something positive. Whet trying to identify the opportunities, you need to ask yourself what can be done better, what can be improved and so on.
In this toolkit you have templates for Business Impact Analysis Methodology, and Business Impact Analysis Questionnaire, which can help you perform a business impact analysis according ISO 22301, the ISO standard for business continuity.
With this toolkit you also have access to business impact analysis video tutorials that will help you fill the documents and perform the BIA.
Regarding mapping GLBA and Cyber Security, unfortunately we do not cover this specific issue. We are focused in ISO standards, but since main concern of GLBA is protection of private information of individuals, by implementing an ISMS based on ISO 27001, and complemented by ISO 27018, we can ensure you will have a pretty strong base to develop your security controls.
Answer: For a ISMS project you should consider first ISO 27001, since this standard defines the requirements for an ISMS. This will help you define your project scope and policy. ISO 27002 can help you best in the risk treatment phase, when you need to define details regarding controls to be implemented.
Answer: You are right in your assumption to substitute the mention of all single employees by a single term, but the correct one to be used is "asset user", because this term establishes that the person who handles the laptop in a given moment is the one responsible for its security. Defining "all employees" as an asset owner is the same as defining that no one is responsible for it.
Also in the video tutorials that came with your toolkit, you can see examples of how to fill out all the data for Risk assessment and Risk treatment.
Document Control
If the forms are the same in terms of content, you can use the same control number.
Risks related to ID cards
Answer: The two main risks are
1 - The employee won't have access to areas or systems which require the ID card as part of the access control until he gets a replacement, becoming unable to perform his activities, which may cause delays on services, non-compliance with deadlines, or loss of business opportunities
2 - If he forgets the ID card in some place other people can find, someone can try to impersonate that employee and gain unauthorized access to areas and systems, and he also may perform activities in the name of the employee, what can cause embarrassment for him and the organization.
Answer: Besides the information security policy that is a requirement for an ISO 27001 ISMS, we have other policies that are more operational. Since you stated you want something more generic, suggest you to take a look at our Acceptable Use Policy, which defines clear rules for the use of the information system and other information assets, ans may attend your needs. The link for a free demo of this policy is https://advisera.com/27001academy/documentation/it-security-policy/
You just have to scroll down the screen a little to find the free demo tab.