1. purpose.To guide the control document in the management of the Organization's data security, modern document available is up to date and complies with ISO 9001 standards, ISO 14001 and ISO 27001.2. scopeComprehensive document control procedures in the management of information security of the Organization, as well as documents that are provided by outside sources, which have been used or referred to in the performance of the organization.3. definitions• Policy (Policy) is the document that indicate the aim and policy of the Organization to maintain the security of your information.• Operating procedures (Procedure) are documents that describe the steps of practice (what you do, who, where, when) to support or achieve its aim as stated in the policy, or manual mechanism.• How to practice (Work Instruction) are documents that describe the details of each point. Intended to support or expand operations as described in the policy, mechanism or manual operational procedures can be executed correctly.• Form (Form) is a document that is used to record the information resulting from the different task by this document is evidence of the operation of the system, which forms the ISMS has been completed is called save (Record)• DCC (Document Control Center) or central document controller. Duties and responsibilities of the DCC is defined in the header 4. responsibilities of the DCC.• A controlled document (Controlled Document) refers to document the system's distributed ISMS with related agencies and need to be updated to date.• The document is controlled (Uncontrolled Document) refers to the system's distributed ISMS documents, with agencies that are not included in the distribution list of documents, which may be either internal or external organizations.
การแปล กรุณารอสักครู่..
