Data security, Quality auditing, Data processing, Computers, Management, Data storage protection, Certification (approval), IT and Information Management: Information SecurityAuditors should ensure new installations, upgrades, reconfigurations or any similar work being done on the security infrastructure ... The introduction of any new facilities by personnel and its use for business purposes should be explicitly authorized. 220.127.116.11 Confidentiality agreements (ISO/IEC 27001, A.6.1.5) a Requirements for confidentiality or non-disclosure ... be the case that people in the organization get unplanned access to confidential information, such as cleaning personnel inanbsp;...
|Title||:||Guide to the Implementation and Auditing of ISMS Controls Based on ISO/IEC 27001|
|Author||:||Ted Humphreys, Angelika Plate|
|Publisher||:||BSI British Standards Institution - 2005|