SlideShare a Scribd company logo
1 of 12
iFour ConsultancyISO 27001 Control A.7.2 – During Employment
A.7.2.1 Management Responsibilities
Application of Information Security
Policies and Procedures of the Organization
Data Protection Policies
Anti Money Laundering Policies
ASP.NET software companies Indiahttp://www.ifourtechnolab.com
Sample Data Protection Policy
Data Controller
Data Protection Officer
Users
Personal Information
Sensitive Data
ASP.NET software companies Indiahttp://www.ifourtechnolab.com
Sample Anti Money Laundering Policy
 Reject assets that are known or suspected to be the proceeds of criminal activity
 Exit from business relationships with individuals or entities known or suspected to
be a terrorist or a criminal organisation or member of such or listed on sanction
lists
 Don’t maintain anonymous accounts, accounts for banks or pay-through accounts
 Don’t enter into relationships with clients from Special Risk Countries
 Don’t enter into relationships with clients operating in prohibited industries
ASP.NET software companies Indiahttp://www.ifourtechnolab.com
A.7.2.2 Information Security Awareness, Education and
Training
Awareness through Education and Training
Regular Updates in Policies and Procedures
Relevance for job function
Fraud Awareness
Anti Bribery Education
ASP.NET software companies Indiahttp://www.ifourtechnolab.com
Sample Fraud Awareness Training
Theft
Payroll fraud
False Expense Reimbursements
False invoicing
ASP.NET software companies Indiahttp://www.ifourtechnolab.com
Sample Anti Bribery Education
Understanding and recognising bribery and corruption
Penalties
Key risk areas
Employee responsibility and how to raise a concern
ASP.NET software companies Indiahttp://www.ifourtechnolab.com
A.7.2.3 Disciplinary Process
Formal and communicated disciplinary process
Proper implementation of disciplinary process
ASP.NET software companies Indiahttp://www.ifourtechnolab.com
Sample Disciplinary Process
Principles
Informal Discussions
Verbal Warning
Written Warning
Final Written Warning
Gross Misconduct
Right to Appeal
ASP.NET software companies Indiahttp://www.ifourtechnolab.com
References
ASP.NET software companies India
https://www.dlapiperdataprotection.com/#handbook/data-protection-
officers-section/c1_IN
https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&sq
i=2&ved=0ahUKEwjDrKPs2J_MAhWF5qYKHXElDFUQFgg4MAM&url=http%3A
%2F%2Fwww.harrisvs.org.uk%2Fhome_htm_files%2FData%2520Protection%
2520Policy%2520Model%25202013.doc&usg=AFQjCNH-
258MmJ9tK5Nr0CW7TTRXpgvokA&bvm=bv.119745492,d.dGY&cad=rja
https://www.rbi.org.in/scripts/BS_ViewMasCirculardetails.aspx?id=8168
https://www.ncjrs.gov/fraudawareness/
http://www.ifourtechnolab.com
References Continued..
ASP.NET software companies India
http://www.ey.com/IN/en/Services/Assurance/Fraud-Investigation---
Dispute-Services/FIDS---A-step-towards-anti-bribery-and-corruption
http://www.smith.williamson.co.uk/anti-bribery-corruption-policy
https://www.google.co.in/search?q=sample+disciplinary+process&ie=utf-
8&oe=utf-8&gws_rd=cr&ei=7cMYV8fYGYXSmwWoqZigCg
https://www.db.com/en/media/Deutsche_Bank_Group_-
_Anti_Money_Laundering_Policy.pdf
http://www.utsystem.edu/cont/Training/FraudAwareness2014.pdf
http://www.ifourtechnolab.com
Thanks
ASP.NET software companies India

More Related Content

What's hot

ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2Tanmay Shinde
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001CUNIX INDIA
 
Comparision of ISO with NIST and COBIT framework
Comparision of ISO with NIST and COBIT frameworkComparision of ISO with NIST and COBIT framework
Comparision of ISO with NIST and COBIT frameworkPooja Soni
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Traininghimalya sharma
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & complianceVandana Verma
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness trainingSAROJ BEHERA
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by SripathiPrajwal Panchmahalkar
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTGaffri Johnson
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentationMidhun Nirmal
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to securityRaghunath G
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromMart Rovers
 
Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
Isms Implementer Course Module 1 Introduction To Information Security
Isms Implementer Course   Module 1   Introduction To Information SecurityIsms Implementer Course   Module 1   Introduction To Information Security
Isms Implementer Course Module 1 Introduction To Information Securityanilchip
 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaiFour Consultancy
 

What's hot (20)

ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001
 
Comparision of ISO with NIST and COBIT framework
Comparision of ISO with NIST and COBIT frameworkComparision of ISO with NIST and COBIT framework
Comparision of ISO with NIST and COBIT framework
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Training
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & compliance
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
A11 part 1
A11 part 1A11 part 1
A11 part 1
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by Sripathi
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to security
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
Isms Implementer Course Module 1 Introduction To Information Security
Isms Implementer Course   Module 1   Introduction To Information SecurityIsms Implementer Course   Module 1   Introduction To Information Security
Isms Implementer Course Module 1 Introduction To Information Security
 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in india
 
ISO/IEC 27001:2005
ISO/IEC 27001:2005ISO/IEC 27001:2005
ISO/IEC 27001:2005
 

Viewers also liked

ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureUppala Anand
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsUppala Anand
 
ISO Annex SL Clause 7: Support
ISO Annex SL Clause 7: SupportISO Annex SL Clause 7: Support
ISO Annex SL Clause 7: SupportRobert Clements
 
Handover of ISO 27001 Certificate to Ministry of Labour, Kingdom of Saudi Arabia
Handover of ISO 27001 Certificate to Ministry of Labour, Kingdom of Saudi ArabiaHandover of ISO 27001 Certificate to Ministry of Labour, Kingdom of Saudi Arabia
Handover of ISO 27001 Certificate to Ministry of Labour, Kingdom of Saudi ArabiaSamir Ahmed
 
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...PECB
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001PECB
 
ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10Pooja Soni
 

Viewers also liked (8)

ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
ISO Annex SL Clause 7: Support
ISO Annex SL Clause 7: SupportISO Annex SL Clause 7: Support
ISO Annex SL Clause 7: Support
 
Handover of ISO 27001 Certificate to Ministry of Labour, Kingdom of Saudi Arabia
Handover of ISO 27001 Certificate to Ministry of Labour, Kingdom of Saudi ArabiaHandover of ISO 27001 Certificate to Ministry of Labour, Kingdom of Saudi Arabia
Handover of ISO 27001 Certificate to Ministry of Labour, Kingdom of Saudi Arabia
 
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
Privacy Act
Privacy ActPrivacy Act
Privacy Act
 
ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10
 

Similar to ISO 27001 Control A.7.2 - During Employment Policies

Cyber fraud and Security - What risks does family office's face in today's wo...
Cyber fraud and Security - What risks does family office's face intoday's wo...Cyber fraud and Security - What risks does family office's face intoday's wo...
Cyber fraud and Security - What risks does family office's face in today's wo...Kannan Subbiah
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
Mastering Privacy: The Role of ISO 27701 in Information Security
Mastering Privacy: The Role of ISO 27701 in Information SecurityMastering Privacy: The Role of ISO 27701 in Information Security
Mastering Privacy: The Role of ISO 27701 in Information SecurityShyamMishra72
 
Is Security Team 2 Glba
Is Security Team 2 GlbaIs Security Team 2 Glba
Is Security Team 2 Glbaguestfd062
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guideNA Putra
 
Building Secure Relationships Across the Enterprise
Building Secure Relationships Across the EnterpriseBuilding Secure Relationships Across the Enterprise
Building Secure Relationships Across the EnterpriseForgeRock
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationSyed Azher
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
 
5 Types of Insider Threats and How to Detect them in Your ERP System
5 Types of Insider Threats and How to Detect them in Your ERP System5 Types of Insider Threats and How to Detect them in Your ERP System
5 Types of Insider Threats and How to Detect them in Your ERP SystemMichael Cunningham
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxinfosec train
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementProlifics
 
Achivers_Article title.pptx
Achivers_Article title.pptxAchivers_Article title.pptx
Achivers_Article title.pptxMahtabHashmi2
 
Enhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdfEnhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdfSA Consultants UAE
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 

Similar to ISO 27001 Control A.7.2 - During Employment Policies (20)

Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
Cyber fraud and Security - What risks does family office's face in today's wo...
Cyber fraud and Security - What risks does family office's face intoday's wo...Cyber fraud and Security - What risks does family office's face intoday's wo...
Cyber fraud and Security - What risks does family office's face in today's wo...
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Mastering Privacy: The Role of ISO 27701 in Information Security
Mastering Privacy: The Role of ISO 27701 in Information SecurityMastering Privacy: The Role of ISO 27701 in Information Security
Mastering Privacy: The Role of ISO 27701 in Information Security
 
Is Security Team 2 Glba
Is Security Team 2 GlbaIs Security Team 2 Glba
Is Security Team 2 Glba
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Testing
TestingTesting
Testing
 
Risky business of social media
Risky business of social mediaRisky business of social media
Risky business of social media
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guide
 
Building Secure Relationships Across the Enterprise
Building Secure Relationships Across the EnterpriseBuilding Secure Relationships Across the Enterprise
Building Secure Relationships Across the Enterprise
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an Organisation
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
5 Types of Insider Threats and How to Detect them in Your ERP System
5 Types of Insider Threats and How to Detect them in Your ERP System5 Types of Insider Threats and How to Detect them in Your ERP System
5 Types of Insider Threats and How to Detect them in Your ERP System
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 
Achivers_Article title.pptx
Achivers_Article title.pptxAchivers_Article title.pptx
Achivers_Article title.pptx
 
Enhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdfEnhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdf
 
IT Policy
IT PolicyIT Policy
IT Policy
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

ISO 27001 Control A.7.2 - During Employment Policies

  • 1. iFour ConsultancyISO 27001 Control A.7.2 – During Employment
  • 2. A.7.2.1 Management Responsibilities Application of Information Security Policies and Procedures of the Organization Data Protection Policies Anti Money Laundering Policies ASP.NET software companies Indiahttp://www.ifourtechnolab.com
  • 3. Sample Data Protection Policy Data Controller Data Protection Officer Users Personal Information Sensitive Data ASP.NET software companies Indiahttp://www.ifourtechnolab.com
  • 4. Sample Anti Money Laundering Policy  Reject assets that are known or suspected to be the proceeds of criminal activity  Exit from business relationships with individuals or entities known or suspected to be a terrorist or a criminal organisation or member of such or listed on sanction lists  Don’t maintain anonymous accounts, accounts for banks or pay-through accounts  Don’t enter into relationships with clients from Special Risk Countries  Don’t enter into relationships with clients operating in prohibited industries ASP.NET software companies Indiahttp://www.ifourtechnolab.com
  • 5. A.7.2.2 Information Security Awareness, Education and Training Awareness through Education and Training Regular Updates in Policies and Procedures Relevance for job function Fraud Awareness Anti Bribery Education ASP.NET software companies Indiahttp://www.ifourtechnolab.com
  • 6. Sample Fraud Awareness Training Theft Payroll fraud False Expense Reimbursements False invoicing ASP.NET software companies Indiahttp://www.ifourtechnolab.com
  • 7. Sample Anti Bribery Education Understanding and recognising bribery and corruption Penalties Key risk areas Employee responsibility and how to raise a concern ASP.NET software companies Indiahttp://www.ifourtechnolab.com
  • 8. A.7.2.3 Disciplinary Process Formal and communicated disciplinary process Proper implementation of disciplinary process ASP.NET software companies Indiahttp://www.ifourtechnolab.com
  • 9. Sample Disciplinary Process Principles Informal Discussions Verbal Warning Written Warning Final Written Warning Gross Misconduct Right to Appeal ASP.NET software companies Indiahttp://www.ifourtechnolab.com
  • 10. References ASP.NET software companies India https://www.dlapiperdataprotection.com/#handbook/data-protection- officers-section/c1_IN https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&sq i=2&ved=0ahUKEwjDrKPs2J_MAhWF5qYKHXElDFUQFgg4MAM&url=http%3A %2F%2Fwww.harrisvs.org.uk%2Fhome_htm_files%2FData%2520Protection% 2520Policy%2520Model%25202013.doc&usg=AFQjCNH- 258MmJ9tK5Nr0CW7TTRXpgvokA&bvm=bv.119745492,d.dGY&cad=rja https://www.rbi.org.in/scripts/BS_ViewMasCirculardetails.aspx?id=8168 https://www.ncjrs.gov/fraudawareness/ http://www.ifourtechnolab.com
  • 11. References Continued.. ASP.NET software companies India http://www.ey.com/IN/en/Services/Assurance/Fraud-Investigation--- Dispute-Services/FIDS---A-step-towards-anti-bribery-and-corruption http://www.smith.williamson.co.uk/anti-bribery-corruption-policy https://www.google.co.in/search?q=sample+disciplinary+process&ie=utf- 8&oe=utf-8&gws_rd=cr&ei=7cMYV8fYGYXSmwWoqZigCg https://www.db.com/en/media/Deutsche_Bank_Group_- _Anti_Money_Laundering_Policy.pdf http://www.utsystem.edu/cont/Training/FraudAwareness2014.pdf http://www.ifourtechnolab.com

Editor's Notes

  1. ASP.NET software companies India – http://www.ifourtechnolab.com
  2. ASP.NET software companies India – http://www.ifourtechnolab.com
  3. ASP.NET software companies India – http://www.ifourtechnolab.com
  4. ASP.NET software companies India – http://www.ifourtechnolab.com
  5. ASP.NET software companies India – http://www.ifourtechnolab.com
  6. ASP.NET software companies India – http://www.ifourtechnolab.com
  7. ASP.NET software companies India – http://www.ifourtechnolab.com
  8. ASP.NET software companies India – http://www.ifourtechnolab.com
  9. ASP.NET software companies India – http://www.ifourtechnolab.com
  10. ASP.NET software companies India – http://www.ifourtechnolab.com
  11. ASP.NET software companies India – http://www.ifourtechnolab.com
  12. ASP.NET software companies India – http://www.ifourtechnolab.com