ISO 9001:2015, 8.3
Clause 8, Operation, has seven sub-clauses: 8.1 Operational Planning and Control 8.2 Requirements for Products and Services 8.3 Design and Development of Products and Services 8.4 Control of Externally Provided Processes, Products, and Services 8.5 Production and Service Provision 8.6 Release of Products and Services 8.7 Control of Nonconforming Outputs This article is on 8.3 Design and Development of Products and Services. 8.3.1 General Requirements: Establish, implement, and maintain a design and development process that is appropriate to...
Read MoreISO 14004:2016
The third edition of ISO 14004 has been published with a new title, “Environmental management systems – General guidelines on implementation”. It replaces ISO 14004:2004 that had the title, “Environmental management systems – General guidelines on principles, systems and support techniques”. ISO 14004:2016 provides guidance for an organization on the establishment, implementation, maintenance, and improvement of a robust, credible, and reliable environmental management system (EMS). The guidance provided is...
Read MoreData Breach Report
The Verizon 2015 Data Breach Investigations Report (DBIR) provides a detailed analysis of almost 80,000 incidents, including 2,100+ confirmed data breaches. Protecting your organization from a data breach could save your business tens of millions of dollars, and help maintain customer loyalty and shareholder confidence. Data security isn’t something that should be left to the IT department. It’s so important that it should matter to leaders, and indeed employees, from all functions. The motives for attacks are varied: attackers may...
Read MoreISO 9001:2015 Classes
We are offering public “ISO 9001:2015 Requirements and Transition Guidance” classes in Atlanta, GA and Orlando, FL. The course is also available as an on-site class, as is our “ISO 14001:2015 Requirements and Transition Guidance” course. ISO 9001:2015 Requirements and Transition Guidance Enrollment for our 2.0 day “ISO 9001:2015 Requirements and Transition Guidance” course is $795 and includes lunch both days. May 17-18, 2016 in Atlanta, GA (Confirmed Class) SpringHill Suites – Atlanta Airport...
Read MoreTop Ten Hacks
According to a recent Black Hat Survey by Balabit, the ten most popular hacking methods in the USA are: 1. Social Engineering (e.g., phishing) – 81% 2. Compromised Accounts (e.g. weak passwords) – 62% 3. Web-Based Attacks (e.g., SQL/command injection) – 51% 4. Client Side Attacks (e.g., against doc readers, web browsers) – 33% 5. Exploit Against Popular Server Updates (e.g., OpenSSL, Heartbleed) – 23% 6. Unmanaged Personal Devices (e.g., lack of BYOD policy) – 21% 7. Physical Intrusion – 15% 8. Shadow...
Read MoreGap Analysis Checklists
Larry Whittington has developed ISO 9001:2015 and ISO 14001:2015 checklists for the purpose of conducting a gap analysis of your current system against the new and changed requirement of the new standards. ISO 9001:2015 Gap Analysis Checklist The 27 page ISO 9001:2015 Gap Analysis Checklist contains 313 questions for organizations new to ISO 9001, and 119 delta questions for ISO 9001:2008 certified organizations. To read a description of the ISO 9001:2015 Gap Analysis Checklist, and see a sample page, go to this web page. You can buy the...
Read More