Examples of Procedures
Examples of (General) Management System (MS) Procedures
Procedure MS-1 - Control of Documents
Procedure MS-2 - Control of Records
Procedure MS-3 - Internal Audit
Procedure MS-4 - Response to Non-Conformity or Incident (including Corrective Action)
Procedure MS-5 - Management Review - NO EXAMPLE; SEE THE NOTE BELOW.
Procedure MS-6 - Preventive Action [Implements requirements in ISO 41001:2018, Section
10.3 and ISO 55001:2014, Section 10.2]
NOTE
There is no explicit requirement to have any of the above procedures but it is useful
to implement them anyway, particularly if your management system must be certified
against two or more management system standards. Additionally, internal audits can
be done against the procedures, rather than against the standard(s).
Procedure MS-5 - Management Review must be customised, according to the nature and
operation of your business, and according to which standards your management system
must be certified.
Examples of (General) Business Management (BM) Procedures
Procedure BM-1 - Starting and Finishing a Role
Procedure BM-2 - Internal and External Communications - NO EXAMPLE; SEE THE NOTE
BELOW.
NOTE
There is no explicit requirement to have the above two procedures but it is useful
to implement them anyway, particularly if your management system must be certified
against two or more management system standards. Additionally, internal audits can
be done against the procedures, rather than against the standard(s).
Procedure BM-2 - Internal and External Communications must be customised, according
to the nature and operation of your business, and according to which standards your
management system must be certified.
Examples of Information Security (IS) Procedures
Procedure IS-1 - Information Security Basics
Procedure IS-2 - Working in Secure Areas
Procedure IS-3 - Network Management
Procedure IS-4 - Mobile Computing
Procedure IS-5 - Backups
Procedure IS-6 - Access Control and Rights Review
Procedure IS-7 - Intellectual Property
Procedure IS-8 - Manage Provider
Procedure IS-9 - Change Control - NO EXAMPLE; SEE THE NOTE BELOW.
NOTE
Procedure IS-9 - Change Control implements ISO/IEC 27001:2013, Control A.12.1.2 -
Change management. This particular control does not itself specify a requirement
for a procedure. However, it is the second of four controls of the group A.12.1 -
Operational procedures and responsibilities. The first control of this group is A.12.1.1
- Documented operating procedures, which specifies “Operating procedures shall be
documented and made available to all users who need them”. Consequently, it is a
good idea to implement A.12.1.2 as (part of) a procedure.
Procedure IS-9 - Change Control must be customised, according to the nature and operation
of your business.
Examples of Data Protection (DP) Procedures
COMING SOON ---> Procedure DP-1 - Data Protection Impact Assessment (DPIA)
COMING SOON ---> Procedure DP-2 - Data Subject Access Request (DSAR)
COMING SOON ---> Procedure DP-3 - Notification of Rights and Processing