We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic. Cookies are small files of information stored on your device that help us remember your preferences and improve your experience. By clicking ‘Accept All’, you consent to our use of cookies. You are able to reject all non-essential cookies or manage your preferences by . To learn more about our Online Digital and Cookie Notice,
click here.
Cookie Preference Center
Please manage your cookie choices by switching the consent toggles on or off under the Purposes below.
You may change your preference at any time as described in our Cookie Policy
This document is purchased as a PDF (Portable Document Format) and accessed via CSA OnDemand™, where you can view, navigate, and print it, or download it for offline use with Adobe Acrobat Viewer. This PDF contains Digital Rights Management protection and is intended for individual use. Please see Terms of Use for CSA’s copyright license and more information.
Pages: 52
PDF
SKU: 2421684
This document is purchased as a PDF (Portable Document Format) and accessed via CSA OnDemand™, where you can view, navigate, and print it, or download it for offline use with Adobe Acrobat Viewer. This PDF contains Digital Rights Management protection and is intended for individual use. Please see Terms of Use for CSA’s copyright license and more information.
1.1 General This International Standard covers all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations). This International Standard specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented ISMS within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof.
The ISMS is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties.
NOTE 1: References to business in this International Standard should be interpreted broadly to mean those activities that are core to the purposes for the organization's existence. NOTE 2: ISO/IEC 17799 provides implementation guidance that can be used when designing controls.
1.2 Application The requirements set out in this International Standard are generic and are intended to be applicable to all organizations, regardless of type, size and nature. Excluding any of the requirements specified in Clauses 4, 5, 6, 7, and 8 is not acceptable when an organization claims conformity to this International Standard.
Any exclusion of controls found to be necessary to satisfy the risk acceptance criteria needs to be justified and evidence needs to be provided that the associated risks have been accepted by accountable persons. Where any controls are excluded, claims of conformity to this International Standard are not acceptable unless such exclusions do not affect the organization's ability, and/or responsibility, to provide information security that meets the security requirements determined by risk assessment and applicable legal or regulatory requirements.
NOTE: If an organization already has an operative business process management system (e.g. in relation with ISO 9001 or ISO 14001), it is preferable in most cases to satisfy the requirements of this International Standard within this existing management system.
Login or Register
View Access for this document is only available for viewers in Canada