Data security, Quality auditing, Data processing, Computers, Management, Data storage protection, Certification (approval), IT and Information Management: Information SecurityThe policy may be a stand-alone statement or part of more extensive documentation (e.g. a security policy manual) that ... 188.8.131.52 Review of the information security policy (ISO/IEC 27001:2005, A.5.1.2) aThe information security policy shall beanbsp;...
|Title||:||Guide to the Implementation and Auditing of ISMS Controls Based on ISO/IEC 27001|
|Author||:||Ted Humphreys, Angelika Plate|
|Publisher||:||BSI British Standards Institution - 2005|