ISO 27001 Clause 4.2 & 4.4 Implementation Guideline
Clause 4.2 Understanding the needs and expectations of interested parties
Required activity
The organization determines interested parties relevant to the ISMS and their requirements relevant to information security.
The organization determines interested parties relevant to the ISMS and their requirements relevant to information security.
Explanation
Interested party may be a defined term that refers to persons or organizations which will affect, be suffering from , or perceive themselves to be suffering from a choice or activity of the organization. Interested parties are often found both outside and inside the organization and may have specific needs, expectations and requirements for the organization’s information security.
Interested party may be a defined term that refers to persons or organizations which will affect, be suffering from , or perceive themselves to be suffering from a choice or activity of the organization. Interested parties are often found both outside and inside the organization and may have specific needs, expectations and requirements for the organization’s information security.
External interested parties can include:
a) Regulators and legislators;
b) Shareholders including owners and investors;
c) Suppliers including subcontractors, consultants, and outsourcing partners;
d) Industry associations;
e) Competitors;
f) Customers and consumers;
g) Activist groups.
a) Regulators and legislators;
b) Shareholders including owners and investors;
c) Suppliers including subcontractors, consultants, and outsourcing partners;
d) Industry associations;
e) Competitors;
f) Customers and consumers;
g) Activist groups.
Internal interested parties can include:
a) Decision makers including top management;
b) Process owners, system owners, and knowledge owners;
c) Support functions like IT or Human Resources;
d) Employees and users;
e) Information security professionals.
a) Decision makers including top management;
b) Process owners, system owners, and knowledge owners;
c) Support functions like IT or Human Resources;
d) Employees and users;
e) Information security professionals.
Implementation Guidance
The following steps should be taken:
— identify external interested parties;
— identify internal interested parties;
— identify requirements of interested parties.
As the needs, expectations and requirement of interested parties change over time, these changes and their influence on the scope, constraints and requirements of the ISMS should be reviewed regularly.
Documented information on this activity and its outcome is mandatory only within the form and to the extent the organization determines as necessary for the effectiveness of its management system .
— identify external interested parties;
— identify internal interested parties;
— identify requirements of interested parties.
As the needs, expectations and requirement of interested parties change over time, these changes and their influence on the scope, constraints and requirements of the ISMS should be reviewed regularly.
Documented information on this activity and its outcome is mandatory only within the form and to the extent the organization determines as necessary for the effectiveness of its management system .
Click here for continue reading:- https://www.info-savvy.com/iso-27001-clause-4-2-4-4-implementation-guideline/
-----------------------------------------------------------------------------------------------------------------
This Blog Article is posted by
Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092
Contact us – www.info-savvy.com
Comments
Post a Comment