INFORMATION SECURITY MANAGEMENT SYSTEMS QUOTE REQUEST FORM

Size: px
Start display at page:

Download "INFORMATION SECURITY MANAGEMENT SYSTEMS QUOTE REQUEST FORM"

Transcription

1 INFORMATION SECURITY MANAGEMENT SYSTEMS QUOTE REQUEST FORM Please provide the following information to enable us to confirm the costs of ISO registration. 1) Organisation details: Company name: Company number: Main site address: Postcode: Tel: Fax: Web site: Contact name: Job title: Tel: Mobile: 2) How long has your management system been in place? 3) What activities are to be covered by your certification (scope)? Information security management for... 4) Are you? a. A new NQA client Yes No b. A transferring client Yes No If a transferring client, please provide details of previous registration(s): Note: Copies of current certificates of registration and previous audit reports will need to be supplied. c. Extending your scope? Yes No If yes, please provide details of the new scope: d. Have you previously been registered with NQA? Yes No 1

2 5) Are you aware of any standards, regulations or laws with which your company or industry must comply? If so list these below. Legal (e.g. Data Protection Act, Computer Misuse Act etc): Regulatory (e.g. PCI DSS, Information Governance Statement of Compliance (IG SoC)): 6) Functions and business activities: Site information - please give details of the employee numbers, addresses and activities of all sites requiring registration to ISO Total in Organisation: Total at Main Address: Other Locations: Address Headcount Activities (customer facing services, design, product management and internal functions such as HR, finance, IT, sales etc) Main address Location 1 Location 2 Location 3 Location 4 Location 5 Location 6 Location 7 Location 8 Address, headcount and activities MUST be completed for all locations 2

3 7) Outsourcing Do you have outsourced or subcontracted activities? Please provide details of outsourced or subcontracted activities: Yes No 8) ISO 9001 Certification: Do you currently hold an accredited certificate of registration for ISO 9001? If your registration is with a certification body other than NQA please give details. Standard: Scope of Registration: Yes No Certification Body: Certificate No: 9) Risk level & complexity: 9a: Risk level: Please identify the risk level (high, medium or low) for each of the three categories below (Legal and regulatory, business continuity and availability, information held/managed). Low Medium High Rating Legal & regulatory Incompliance is likely to Incompliance is likely to Incompliance is likely lead to insignificant financial result in significant financial result in prosecution penalty or goodwill damage penalty or goodwill damage Business Continuity & availability Impact restricted to Lack of availability or outage Information must be commercial /operational inconvenience has significant impact on essential services such as healthcare outages are likely to receive prioritised response from national/local government emergency planning arrangements available (e.g. critical national infrastructure) at all times Information held/managed Information of a general nature Sensitive and personally identifiable information. (Note: this includes employee information) High classification government information e.g. secret and above; government emergency broadcast Examples Office Use: Commercial organisations, general businesses that do not form a critical part of supply chains or partnering for medium and high risk organisations. Note: to have a low risk rating the organisation must not hold personally identifiable employee information. Final risk rating Hospitals, finance sector e.g. banks, local government, telecoms providers and others holding personally identifiable information /sensitive personally identifiable information. Government ministries, critical national infrastructure (e.g. broadcast). Comment: b: Complexity Rating Complexity Factor Category Category Simple ( S ) Complex ( C ) Rating Number of employees and contractor staff <1,000 >=1,000 S C Number of users <1 million >=1,000,000 S C Number of sites <5 >=5 S C Number of servers <100 >=100 S C Number of workstations + PC + laptops <300 >=300 S C Number of application developers and maintenance staff <100 >=100 S C 3

4 Office Use: Overall complexity rating: S C Comment: Office Use: Assessment durations Assessment On-site (days) Programme management (days) Total (days) Pre-assessment (optional) Stage 1 Stage 2 Surveillance Recertification Completed by/date: Approved by/date: 10) At what stage in the implementation of your ISMS are you? Please indicate your progress in relation to the following phases: Phase: Description: Completed: Planned completion date: Required for Stage 1 Stage 2 Step 1 Definition of Policy Statement Yes No Y Y Step 2 Defined the scope of your ISMS Yes No Y Y Step 3 Completed your Risk Assessment Yes No Y Y Step 4 Completed your Risk Treatment Plan document Yes No Y Y Step 5 Selected control objectives and controls to be implemented Yes No Y Y Step 6 Prepared a Statement of Applicability Yes No Y Y Step 7 Completed security awareness training Yes No Preferable Y Completed internal audit of the ISMS Yes No Preferable Y Completed management review of the ISMS Yes No Preferable Y Completed and test business continuity plans Yes No Preferable Y Operated the ISMS for at least 3 months Yes No Preferable Y (If YES to Step 7 b) how long has your ISMS been implemented? Office completion: Timescales Pre-assessment Target date: Stage 1 Stage 2: Target date: Target date: 4

5 11) Consultant use: Will you be using a Consultant to help you implement Information Security Management Systems? Yes No (If yes, please complete their details below). Consultant name: Address: Tel: Fax: 12) Completed by: Date: Company: Name: 13) Where did you hear about NQA? By recommendation from consultant By recommendation from another company From an editorial From an advert Via NQA s web site You are an existing NQA client From an exhibition Via a search engine: e.g. Google Other (please specify) Please provide further details below: If you have any problems completing this questionnaire please call or sales@nqa.com Click here to send via Or print and send to: NQA Sales, Warwick House, Houghton Hall Park, Houghton Regis, Dunstable, Bedfordshire LU5 5ZX, UK Data Protection Act 1998 This information is collected, processed and stored to adhere with the UK Data Protection Act Information will be held and used by NQA and may from time to time be used to send you marketing information relating to products or services we feel you may be interested in. Please confirm that you would be happy to receive this information: By Fax: Telephone: Contact us NQA, Warwick House, Houghton Hall Park, Houghton Regis, Dunstable, Bedfordshire LU5 5ZX, UK T: E: sales@nqa.com QF/ISMS/03/NOV15 5

ENVIRONMENTAL MANAGEMENT SYSTEMS QUOTE REQUEST FORM

ENVIRONMENTAL MANAGEMENT SYSTEMS QUOTE REQUEST FORM ENVIRONMENTAL MANAGEMENT SYSTEMS QUOTE REQUEST FORM Please provide the following information to enable us to confirm the costs of registration. To which standard are you requiring registration? (please

More information

Management Systems Consultancy & Support Specialists

Management Systems Consultancy & Support Specialists Consultancy Management Systems Continual Improvement Outsourcing Auditing Support Data Analysis Training Documentation Services to meet your business requirements specialise in ISO 9001 Quality Management

More information

APPLICATION for ISO Certification (All Standards)

APPLICATION for ISO Certification (All Standards) APPLICATION for ISO Certification (All Standards) Contents Section 1 General Information (Please complete this section for All standards) (Please complete ONLY the sections for the Standard(s) that you

More information

Aerospace Guidance Document

Aerospace Guidance Document Aerospace Guidance Document Introduction AS9100, AS9110 and AS9120 all include ISO 9001:2008 registration and specify additional requirements for a quality management system for the aerospace industry.

More information

Rules for the certification of Quality Management Systems

Rules for the certification of Quality Management Systems Rules for the certification of Quality Management Systems Effective from September 15 th, 2015 RINA Via Corsica, 12 16128 Genova - Italy Tel.: +39 01053851 Fax: +39 0105351000 Web site: www.rina.org Technical

More information

ISO/IEC 20000-1 Registration Guidance Document

ISO/IEC 20000-1 Registration Guidance Document ISO/IEC 20000-1 Registration Guidance Document Introduction This document is written to help you understand your organization s role and responsibilities in the registration/certification process and to

More information

1 ABOUT THIS PART... 2 2 COMPLIANCE WITH STANDARDS GENERALLY... 2 3 COMPLIANCE WITH TECHNOLOGY INDUSTRY STANDARDS... 3

1 ABOUT THIS PART... 2 2 COMPLIANCE WITH STANDARDS GENERALLY... 2 3 COMPLIANCE WITH TECHNOLOGY INDUSTRY STANDARDS... 3 CONTENTS 1 ABOUT THIS PART... 2 2 COMPLIANCE WITH STANDARDS GENERALLY... 2 Nature of compliance... 2 Charges... 2 Audit... 3 3 COMPLIANCE WITH TECHNOLOGY INDUSTRY STANDARDS... 3 Amendments to Technology

More information

NICEIC Certification and Oil Firing Schemes

NICEIC Certification and Oil Firing Schemes Assessment Scheme Rules for the OFTEC Oil Firing Technician 1. Introduction This document contains the Scheme Rules applied by NICEIC Certification in the operation of the UK oil industry s Nationally

More information

Customer-Facing Information Security Policy

Customer-Facing Information Security Policy Customer-Facing Information Security Policy Global Security Office (GSO) Version 2.6 Last Updated: 03/23/2015 Symantec Corporation Table of Contents Compliance Framework... 1 High-Level Information Security

More information

How To Write A Pca Dss Compliance Solution For Gameplan Group Ltd

How To Write A Pca Dss Compliance Solution For Gameplan Group Ltd PCI Compliance reporting solution This document describes GamePlan s PCI DSS compliance solution and its ability to assist organisations to be compliant with the regulatory requirements of the Payment

More information

Policy Document Control Page

Policy Document Control Page Policy Document Control Page Title Title: Information Governance Policy Version: 5 Reference Number: CO44 Keywords: Information Governance Supersedes Supersedes: Version 4 Description of Amendment(s):

More information

GLASGOW LIFE ATTENDANCE MANAGEMENT

GLASGOW LIFE ATTENDANCE MANAGEMENT GLASGOW LIFE ATTENDANCE MANAGEMENT Final Report INTERNAL AUDIT April 2013 Glasgow City Council Internal Audit 1 GLASGOW LIFE Attendance Management Table of Contents Section No Section Title 1 Introduction

More information

ISO 14001 Registration Guidance Document

ISO 14001 Registration Guidance Document Introduction ISO 14001 Registration Guidance Document ISO 14001:2004 emphasizes the continuous improvement of an environmental management system (EMS). The standard specifies requirements for an environmental

More information

Service Level Agreement: Support Services (Version 3.0)

Service Level Agreement: Support Services (Version 3.0) Service Level Agreement: Support Services (Version 3.0) This Service Level Agreement ("SLA") is attached to the Agreement (Number [ ]) entered into between Uniware Systems Limited ("Uniware") and the Customer

More information

HKCAS Supplementary Criteria No. 8

HKCAS Supplementary Criteria No. 8 Page 1 of 12 HKCAS Supplementary Criteria No. 8 Accreditation Programme for Information Security Management System (ISMS) Certification 1 INTRODUCTION 1.1 HKAS accreditation for information security management

More information

ISO/TS 16949:2002 Guidance Document

ISO/TS 16949:2002 Guidance Document ISO/TS 16949:2002 Guidance Document Introduction ISO/TS 16949:2009 emphasizes the development of a process oriented quality management system that provides for continual improvement, defect prevention,

More information

THE POWER TO BUILD YOUR BUSINESS

THE POWER TO BUILD YOUR BUSINESS THE POWER TO BUILD YOUR BUSINESS FIND out how our products and services can power your business to success the power behind your business who we are NICEIC and ELECSA are leading voluntary regulatory bodies

More information

TÜV UK Ltd Guidance & Self Evaluation Checklist

TÜV UK Ltd Guidance & Self Evaluation Checklist ISO 9001:2015 Revision TÜV UK Ltd Guidance & Self Evaluation Checklist Why ISO 9001 is changing All ISO management system standards are subject to a periodic review under the rules by which they are written.

More information

Rules for the certification of Environmental Management Systems

Rules for the certification of Environmental Management Systems Rules for the certification of Environmental Management Systems Effective from November 19 th, 2015 RINA Via Corsica, 12 16128 Genova - Italy Tel.: +39 01053851 Fax: +39 0105351000 Web site: www.rina.org

More information

Third Party Agent Registration and PCI DSS Compliance Validation Guide

Third Party Agent Registration and PCI DSS Compliance Validation Guide Visa Europe Third Party Agent Registration and PCI DSS Compliance Validation Guide May 2016 Version 1.3 Visa Europe 2015 Contents 1 Introduction... 4 1.1 Definitions of Agents... 4 2 Registration Process...

More information

Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy

Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management

More information

TYPICAL ISO 9001 CERTIFICATION COSTS

TYPICAL ISO 9001 CERTIFICATION COSTS TYPICAL ISO 9001 CERTIFICATION COSTS Typical costs for various size organisations are shown below. Firm quotations are normally provided following receipt of a completed Request for Quotation form. Mandatory

More information

Third Party Supplier Security

Third Party Supplier Security Third Party Supplier Security Managing risk and compliance through external due diligence audits. Presented by: Stephen Higgins 6 th December 2012 To cover When third party supplier security goes wrong...

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Our consultancy team will provide guidance throughout the process helping you to produce the necessary documentation and raise staff awareness.

Our consultancy team will provide guidance throughout the process helping you to produce the necessary documentation and raise staff awareness. Service Definition Business Continuity Plan Overview of Service Sapphire provides a bespoke service, working with your organisation to develop a comprehensive Business Continuity Plan (BCP) designed to

More information

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

Name: Position held: Company Name: Is your organisation ISO27001 accredited: Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:

More information

ISO 27001 Information Security Management Services (Lot 4)

ISO 27001 Information Security Management Services (Lot 4) ISO 27001 Information Security Management Services (Lot 4) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. LHIS TECHNICAL ASSURANCE SERVICES... 3 3. SERVICE OVERVIEW... 4 4. EXPERIENCE...

More information

Information Services Strategy 2011-2013

Information Services Strategy 2011-2013 Information Services Strategy Issue 1 1 Introduction The States of Jersey public sector is facing significant pressure for efficiencies and savings. This has created the context to take a fresh look at

More information

University of Liverpool

University of Liverpool University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

MEDIA GUIDELINES RELEASED 7 JULY 2015

MEDIA GUIDELINES RELEASED 7 JULY 2015 MEDIA GUIDELINES RELEASED 7 JULY 2015 INTRODUCTION 1. These Guidelines deal with media matters in relation to the Royal Commission into Family Violence (Royal Commission). 1 2. These Guidelines may be

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

Frequency Asked Questions Information Security Management System (ISMS) Standards Version 3.0 May 2005

Frequency Asked Questions Information Security Management System (ISMS) Standards Version 3.0 May 2005 Frequency Asked Questions Information Security Management System (ISMS) Standards Version 3.0 May 2005 The following are a set of frequently asked questions that relate to new developments regarding ISO/IEC

More information

Business Management System Manual. Context, Scope and Responsibilities

Business Management System Manual. Context, Scope and Responsibilities Business Management System BMS Manual Page 1 of 11 Business Management System Manual Context, Scope and Responsibilities ISO 9001:2015 BMS.0100 R1 MAS Solutions LLC 29810 FM 1093 Suite C Fulshear, TX 77441

More information

BSI audited HCPC on the 6 May 2014, as the second audit of the new three year audit cycle across the whole organisation.

BSI audited HCPC on the 6 May 2014, as the second audit of the new three year audit cycle across the whole organisation. Audit Committee, 24 June 2014 BSI ISO 9001:2008 Audit Report Executive summary and recommendations Introduction BSI audited HCPC on the 6 May 2014, as the second audit of the new three year audit cycle

More information

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

WHITE PAPER. PCI Basics: What it Takes to Be Compliant WHITE PAPER PCI Basics: What it Takes to Be Compliant Introduction A long-running worldwide advertising campaign by Visa states that the card is accepted everywhere you want to be. Unfortunately, and through

More information

MANAGEMENT SYSTEM CERTIFICATION CONDITIONS & USE OF THE CERTIFICATION MARK

MANAGEMENT SYSTEM CERTIFICATION CONDITIONS & USE OF THE CERTIFICATION MARK MANAGEMENT SYSTEM CERTIFICATION CONDITIONS & USE OF THE CERTIFICATION MARK Vehicle Certification Agency 1, The Eastgate Centre Eastgate Road Bristol BS5 6XX Telephone: 0300 330 5797 e-mail: enquiries@vca.gov.uk

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

What you need to do to comply with the law

What you need to do to comply with the law HS Direct Ltd Meadowhall House 3 Hayland Street Sheffield S9 1BY Tel 0800 849 6728 www.hsdirect.co.uk What you need to do to comply with the law All companies and traders within the UK must comply with

More information

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

AN OVERVIEW OF INFORMATION SECURITY STANDARDS AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

Compliance Security Continuity

Compliance Security Continuity Compliance Security Continuity About Us Information Security Put the necessary processes, policies and procedures in place, identify your company s most valuable assets and implement and test controls

More information

SABPP IT GOVERNANCE COMMITTEE TERMS OF REFERENCE

SABPP IT GOVERNANCE COMMITTEE TERMS OF REFERENCE SABPP IT GOVERNANCE COMMITTEE TERMS OF REFERENCE PREAMBLE The purpose of the IT Governance Committee is to ensure that IT is effectively governed at SABPP in accordance with the King III Code of Governance

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

I S O I E C 2 7 0 0 2 2 0 1 3 I N F O R M A T I O N S E C U R I T Y A U D I T T O O L

I S O I E C 2 7 0 0 2 2 0 1 3 I N F O R M A T I O N S E C U R I T Y A U D I T T O O L 15.1 ESTABLISH SECURITY AGREEMENTS WITH SUPPLIERS 15.1.1 EXPECT SUPPLIERS TO COMPLY WITH RISK MITIGATION AGREEMENTS Do you clarify the information security risks that exist whenever your suppliers have

More information

System Security. Your data security is always our top priority

System Security. Your data security is always our top priority Your data security is always our top priority Data security is an important factor for every client, our continued investment in the latest technology methods and world class data centres show our commitment

More information

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee

More information

How To Manage A Business Continuity Strategy

How To Manage A Business Continuity Strategy Business continuity strategy 2009 2012 Table of contents 1 Why this strategy is needed 3 2 Aim of the strategy 4 3 Our approach to business continuity 4 PROCESS 4 STRUCTURE 5 DOCUMENTATION 6 DISRUPTION

More information

CONTROLLED DOCUMENT. Traffic Management Policy

CONTROLLED DOCUMENT. Traffic Management Policy CONTROLLED DOCUMENT CATEGORY: CLASSIFICATION: PURPOSE Controlled Number: Document Version Number: 1 Controlled Sponsor: Controlled Lead: Approved By: On: Document Document Policy Governance To set out

More information

FSSC Integrity Program Audit Data Summary & Auditor Database CB instructions for use

FSSC Integrity Program Audit Data Summary & Auditor Database CB instructions for use Virtual Integrated Advanced management SYstems Solutions & Tools cont FSSC Integrity Program Audit Data Summary & Auditor Database CB instructions for use Introduction In the framework of the implementation

More information

Enabling Compliance Requirements using ISMS Framework (ISO27001)

Enabling Compliance Requirements using ISMS Framework (ISO27001) Enabling Compliance Requirements using ISMS Framework (ISO27001) Shankar Subramaniyan Manager (GRC) Wipro Consulting Services Shankar.subramaniyan@wipro.com 10/21/09 1 Key Objectives Overview on ISO27001

More information

Expression of Interest

Expression of Interest Expression of Interest This Expression of Interest (EOI) form is designed to allow organisations who wish to work with Pluss to provide us with relevant information. Please ensure that you answer each

More information

Version 1.0. Ratified By

Version 1.0. Ratified By ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified 5 th March 2013 Author(s) Responsible Committee / Officers Issue Date 5 th March 2013 Review Date Intended Audience

More information

Tier 1 Hardware. Secure Infrastructure. Peace of Mind. and Expert

Tier 1 Hardware. Secure Infrastructure. Peace of Mind. and Expert Accreditations Secure Infrastructure iomart s UK cloud infrastructure consists of a wholly owned network of data centres across 8 locations, connected by our own high speed dark fibre network. Our global

More information

Logica Sweden provides secure and compliant cloud services with CA IdentityMinder TM

Logica Sweden provides secure and compliant cloud services with CA IdentityMinder TM CUSTOMER SUCCESS STORY Logica Sweden provides secure and compliant cloud services with CA IdentityMinder TM CUSTOMER PROFILE Industry: IT services Company: Logica Sweden Employees: 5,200 (41,000 globally)

More information

ISMS Implementation Guide

ISMS Implementation Guide atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation

More information

Cyber and Data Security. Proposal form

Cyber and Data Security. Proposal form Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which

More information

Invitation to Quote (ITQ) for STREET WORKS IT SOLUTION

Invitation to Quote (ITQ) for STREET WORKS IT SOLUTION Easthampstead House, Town Square, Bracknell, Berkshire RG12 1AQ Tel: (01344) 352000 Invitation to Quote (ITQ) for STREET WORKS IT SOLUTION xxx COMPLETED BY ORGANISATION [Supplier to complete] NAME DATE

More information

An Alternative Method for Maintaining ISO 9001/2/3 Certification / Registration

An Alternative Method for Maintaining ISO 9001/2/3 Certification / Registration International Accreditation Forum, Inc. An Alternative Method for Maintaining ISO 9001/2/3 Certification / Registration A Discussion Paper The International Accreditation Forum, Inc. (IAF) operates a program

More information

Rotherham CCG Network Security Policy V2.0

Rotherham CCG Network Security Policy V2.0 Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October

More information

Specialist Cloud Services. Acumin Cloud Security Resourcing

Specialist Cloud Services. Acumin Cloud Security Resourcing Specialist Cloud Services Acumin Cloud Security Resourcing DOCUMENT: FRAMEWORK: STATUS Cloud Security Resourcing Service Definition G-Cloud Released VERSION: 1.0 CLASSIFICATION: CloudStore Acumin Consulting

More information

The Xact Group. Service Features & Benefits. Solutions for all of your best practice and regulatory compliance issues

The Xact Group. Service Features & Benefits. Solutions for all of your best practice and regulatory compliance issues Service Features & Benefits The Xact Group Solutions for all of your best practice and regulatory compliance issues WORKING TOGETHER MAKING IT EASIER TO COMPLY Business Overview THE COMPANY The Xact Group

More information

WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY. Data Label: Public

WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY. Data Label: Public WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY CONTENTS 1. POLICY STATEMENT... 3 2. PRINCIPLES... 3 DEFINITIONS... 4 3. OBJECTIVES... 4 4. SCOPE... 4 5. OWNERSHIP & RESPONSIBILITIES...

More information

General Rules for the certification of Management Systems

General Rules for the certification of Management Systems General Rules for the certification of Management Systems Effective from 19/11/2015 RINA Via Corsica 12 16128 Genova - Italy tel. +39 010 53851 fax +39 010 5351000 website : www.rina.org Technical rules

More information

A. Reference information. A0. G-Cloud Programme unique ID number for the service and version number of this scoping template

A. Reference information. A0. G-Cloud Programme unique ID number for the service and version number of this scoping template G-Cloud Service Pan Government Security Accreditation Scope This form is intended for Suppliers of services on the G-Cloud to complete. Upon receipt, the G-Cloud Programme will check Section A, Reference

More information

PROCESS OF CERTIFICATION - PC. November 2014

PROCESS OF CERTIFICATION - PC. November 2014 PROCESS OF CERTIFICATION - PC November 2014 1 CONTENTS 1. Enquiry Stage... 3 2. Application Stage... 3 3. Pre-Assessment Stage... 3 4. Assessment Stage... 4 5. Clearance of non-compliance... 4 6. Recommendation

More information

Certification Procedure of RSPO Supply Chain Audit

Certification Procedure of RSPO Supply Chain Audit : 1 of 19 Table of Contents 1. Purpose 2. Scope 3. Unit of Certification 3.1 Identity Preserved, Segregation, Mass Balance, 3.2. Book and Claim 4. Definitions 5. Responsibilities 5.1 Head of the Certification

More information

Information Governance Standards in Relation to Third Party Suppliers and Contractors

Information Governance Standards in Relation to Third Party Suppliers and Contractors Information Governance Standards in Relation to Third Party Suppliers and Contractors Document Summary Ensure staff members are aware of the standards that should be in place when considering engaging

More information

CPM. Esurance CPM Application Form INSURANCE FOR CYBER, PRIVACY & MEDIA RISKS

CPM. Esurance CPM Application Form INSURANCE FOR CYBER, PRIVACY & MEDIA RISKS CPM INSURANCE FOR CYBER, PRIVACY & MEDIA RISKS Esurance CPM Application Form This is an application for a cyber, privacy and media liability package policy aimed at a wide range of companies and professionals.

More information

Application Form. LSC Group of Colleges 1. PROGRAMMES: 2. PERSONAL DETAILS: (As per passport) 3. PERMANENT ADDRESS:

Application Form. LSC Group of Colleges 1. PROGRAMMES: 2. PERSONAL DETAILS: (As per passport) 3. PERMANENT ADDRESS: LSC Group of Colleges Ref. No: 10th & 15th Floor, Southern Tower, First Subang, Jalan SS15/4G, 47500 Subang Jaya, Selangor D.E, Malaysia Tel: +603-5635 1558 Fax: + 603-5635 1557 Student ID No. (Official

More information

Fraud - Preparing Data Card Transactions

Fraud - Preparing Data Card Transactions Liverpool Hope University PCI DSS Policy Document Control Date Revision/Amendment Details & Reason Author 26 th March 2015 Updates G. Donelan 23 rd June 2015 Audit Committee 7 th July 2015 University Council

More information

To join Achilles UVDB, visit www.achilles.com/uvdb, call +44 (0)1235 861118 or email enquiries@achilles.com

To join Achilles UVDB, visit www.achilles.com/uvdb, call +44 (0)1235 861118 or email enquiries@achilles.com UVDB Achilles UVDB FAQ s About Achilles UVDB What is the Achilles UVDB Supplier Information Management Service? Achilles UVDB is the community for the UK utilities industry. It enables the utilities sector

More information

FIS Associate Membership

FIS Associate Membership FIS Associate Membership We have pleasure in sending you information about FIS Associate Membership. FIS represents companies involved in all aspects of interior fit out, refurbishment and building finishes.

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Policy ID IG02 Version: V1 Date ratified by Governing Body 27/09/13 Author South Commissioning Support Unit Date issued: 21/10/13 Last review date: N/A Next review date: September

More information

National Accreditation Board for Certification Bodies. Accreditation Criteria

National Accreditation Board for Certification Bodies. Accreditation Criteria Accreditation Criteria for Medical devices - Quality management systems - for regulatory purposes Certification BCB 135 October 2012 Contents 0.0 Foreword 2 1.0 Scope 2 2.0 Criteria 2 3.0 Guidance on the

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Version: 4 Bodies consulted: Caldicott Guardian, IM&T Directors Approved by: MT Date Approved: 27/10/2015 Lead Manager: Governance Manager Responsible Director: SIRO Date

More information

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania Evaluating and Managing Third Party IT Service Providers Are You Really Getting The Assurance You Need To Mitigate Information Security and Privacy Risks? Kevin Secrest IT Audit Manager, University of

More information

Intelligent Vendor Risk Management

Intelligent Vendor Risk Management Intelligent Vendor Risk Management Cliff Baker, Managing Partner, Meditology Services LeeAnn Foltz, JD Compliance Resource Consultant, WoltersKluwer Law & Business Agenda Why it s Needed Regulatory Breach

More information

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant Brochure More information from http://www.researchandmarkets.com/reports/3302152/ Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT /

More information

Intel Enhanced Data Security Assessment Form

Intel Enhanced Data Security Assessment Form Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized

More information

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open Protective Monitoring as a Service Version: 1.0, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this

More information

Information Security: Business Assurance Guidelines

Information Security: Business Assurance Guidelines Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies

More information

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone: Company or Trading Name: Address: Post Code: Telephone: E-mail: Website: Date Business Established Number of Employees Do you have a Chief Privacy Officer (or Chief Information Officer) who is assigned

More information

Information for Schools and Colleges. So you want to. Know more about the BS EN ISO 9000:2000 family of quality management system standards

Information for Schools and Colleges. So you want to. Know more about the BS EN ISO 9000:2000 family of quality management system standards Information for Schools and Colleges So you want to Know more about the BS EN ISO 9000:2000 family of quality management system standards A brief history of BS EN ISO 9000:2000 From the 1920 s to the 1940

More information

The TORI project: 19 March 2013 Sari-Anne Hannula, Project Manager VM JulkICT function

The TORI project: 19 March 2013 Sari-Anne Hannula, Project Manager VM JulkICT function The TORI project: bringing together domainindependent government ICT tasks 19 March 2013 Sari-Anne Hannula, Project Manager VM JulkICT function Government Programme Background > all functions of the State

More information

ISO 9001:2008 The Standard for World-Class Quality

ISO 9001:2008 The Standard for World-Class Quality ISO 9001:2008 The Standard for World-Class Quality 2 ISO 9001:2008 The Standard for World-Class Quality THE HAND THAT GUIDES Change Management Consulting specializes in providing ISO 9001/QS-9000 implementation

More information

Accounts Production Installation Guide

Accounts Production Installation Guide Accounts Production Installation Guide Copyright statement Sage (UK) Limited and Sage Hibernia Limited, 2014. All rights reserved. If this documentation includes advice or information relating to any matter

More information

PCI DSS and SSC what are these?

PCI DSS and SSC what are these? PCI DSS and SSC what are these? What does PCI DSS mean? PCI DSS is the English acronym for Payment Card Industry Data Security Standard. What is the PCI DSS programme? The bank card data, which are the

More information

Rules for the certification of event sustainability management system

Rules for the certification of event sustainability management system Rules for the certification of event sustainability management system In force from 10/09/2014 RINA Services S.p.A. Via Corsica, 12 16128 Genova Tel. +39 010 53851 Fax +39 010 5351000 E-MAIL: info@rina.org,

More information

Empowering sustainable and ethical supply chains

Empowering sustainable and ethical supply chains Empowering sustainable and ethical supply chains Sedex is a not for profit global membership organisation dedicated to driving improvements in responsible and ethical business practices in global supply

More information

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact

More information

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose... IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This

More information

CAPITAL WORKS GUIDANCE DOCUMENT

CAPITAL WORKS GUIDANCE DOCUMENT COMMUNITY BUILDINGS TRANSFER PROGRAMME CAPITAL WORKS GUIDANCE DOCUMENT This document has been prepared to assist and advise management groups of community buildings who are involved in Durham County Council

More information

Deploying Cloud Security Standards The MTCS Experience

Deploying Cloud Security Standards The MTCS Experience Deploying Cloud Security Standards The MTCS Experience Presented to ASEAN CSA Summit 2015 Tao Yao Sing Assistant Director, National Cloud Computing Office 12 June 2015 Background Cloud security is always

More information

CP14 ISSUE 5 DATED 1 st OCTOBER 2015 BINDT Audit Procedure Conformity Assessment and Certification/Verification of Management Systems

CP14 ISSUE 5 DATED 1 st OCTOBER 2015 BINDT Audit Procedure Conformity Assessment and Certification/Verification of Management Systems Certification Services Division Newton Building, St George s Avenue Northampton, NN2 6JB United Kingdom Tel: +44(0)1604-893-811. Fax: +44(0)1604-893-868. E-mail: pcn@bindt.org CP14 ISSUE 5 DATED 1 st OCTOBER

More information

Security standards PCI-DSS, HIPAA, FISMA, ISO 27001. End Point Corporation, Jon Jensen, 2014-07-11

Security standards PCI-DSS, HIPAA, FISMA, ISO 27001. End Point Corporation, Jon Jensen, 2014-07-11 Security standards PCI-DSS, HIPAA, FISMA, ISO 27001 End Point Corporation, Jon Jensen, 2014-07-11 PCI DSS Payment Card Industry Data Security Standard There are other PCI standards beside DSS but this

More information

Compliance, Audits and Fire Drills: In the Way of Real Security?

Compliance, Audits and Fire Drills: In the Way of Real Security? Compliance, Audits and Fire Drills: In the Way of Real Security? Mark Estberg and John Howie Microsoft Corporation Session ID: SP01-203 Session Classification: Intermediate Introduction Microsoft s Global

More information