Search Results for: privacy

ISO-5: Classification of Assets

In the previous article we discussed the need for creating Asset Inventory as part of the Context setting. In the process, we identified four different aspects such as “Data Storage Points”, “Data Collection Points”, Data Processing Points” and “Data Disclosure … Continue reading

Posted in Cyber Law | Leave a comment

ISO-4: Understanding the Context

Before an organization sets about to establish an ISMS or an auditor starts an ISO 27001 audit, it is essential to understand and set the ‘Context’ in which the activity needs to be planned and implemented. By ‘Context’ we mean … Continue reading

Posted in Cyber Law | Leave a comment

ISO-3: Structure -10 clauses with 93 Controls

ISO 27001:2022 adopts a structure of presenting the requirements through the main document that consists of 10 clauses and the Annexe A which indicates 93 controls. In comparison, PDPSI adopts 12 Standards and 50 Model Implementation Specifications. The first three … Continue reading

Posted in Cyber Law | Leave a comment

ISO-1: The Scope of ISO 27001:2022

The scope of the ISO 27001:2022 standard is to provide requirements for establishing, implementing, maintaining and continually improving an information security management system. (ISMS). The ISMS preserves the confidentiality, integrity and availability of information by applying a risk management process. … Continue reading

Posted in Cyber Law | Leave a comment

ISO 27001:2022 Demystified

In November 2022, ISO introduced a new version of its popular ISMS framework namely ISO 27001. This ISO 27001:2022 will be the new standard to replace the ISO 27001:2013 version. The ISO expects that the certifications on the basis of … Continue reading

Posted in Cyber Law | Leave a comment

“Set a thief to catch a thief”… In the context of AI in Banks

AI is the buzzword in the tech world right now. Any software developer today meeting a client will first try to project how AI is built into his product to make it more efficient and cost effective. Every industry is … Continue reading

Posted in Cyber Law | Leave a comment