SlideShare a Scribd company logo
1 of 12
iFour ConsultancyISO 27001 Control A.7.2 – During Employment
A.7.2.1 Management Responsibilities
Application of Information Security
Policies and Procedures of the Organization
Data Protection Policies
Anti Money Laundering Policies
ASP.NET software companies Indiahttp://www.ifourtechnolab.com
Sample Data Protection Policy
Data Controller
Data Protection Officer
Users
Personal Information
Sensitive Data
ASP.NET software companies Indiahttp://www.ifourtechnolab.com
Sample Anti Money Laundering Policy
 Reject assets that are known or suspected to be the proceeds of criminal activity
 Exit from business relationships with individuals or entities known or suspected to
be a terrorist or a criminal organisation or member of such or listed on sanction
lists
 Don’t maintain anonymous accounts, accounts for banks or pay-through accounts
 Don’t enter into relationships with clients from Special Risk Countries
 Don’t enter into relationships with clients operating in prohibited industries
ASP.NET software companies Indiahttp://www.ifourtechnolab.com
A.7.2.2 Information Security Awareness, Education and
Training
Awareness through Education and Training
Regular Updates in Policies and Procedures
Relevance for job function
Fraud Awareness
Anti Bribery Education
ASP.NET software companies Indiahttp://www.ifourtechnolab.com
Sample Fraud Awareness Training
Theft
Payroll fraud
False Expense Reimbursements
False invoicing
ASP.NET software companies Indiahttp://www.ifourtechnolab.com
Sample Anti Bribery Education
Understanding and recognising bribery and corruption
Penalties
Key risk areas
Employee responsibility and how to raise a concern
ASP.NET software companies Indiahttp://www.ifourtechnolab.com
A.7.2.3 Disciplinary Process
Formal and communicated disciplinary process
Proper implementation of disciplinary process
ASP.NET software companies Indiahttp://www.ifourtechnolab.com
Sample Disciplinary Process
Principles
Informal Discussions
Verbal Warning
Written Warning
Final Written Warning
Gross Misconduct
Right to Appeal
ASP.NET software companies Indiahttp://www.ifourtechnolab.com
References
ASP.NET software companies India
https://www.dlapiperdataprotection.com/#handbook/data-protection-
officers-section/c1_IN
https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&sq
i=2&ved=0ahUKEwjDrKPs2J_MAhWF5qYKHXElDFUQFgg4MAM&url=http%3A
%2F%2Fwww.harrisvs.org.uk%2Fhome_htm_files%2FData%2520Protection%
2520Policy%2520Model%25202013.doc&usg=AFQjCNH-
258MmJ9tK5Nr0CW7TTRXpgvokA&bvm=bv.119745492,d.dGY&cad=rja
https://www.rbi.org.in/scripts/BS_ViewMasCirculardetails.aspx?id=8168
https://www.ncjrs.gov/fraudawareness/
http://www.ifourtechnolab.com
References Continued..
ASP.NET software companies India
http://www.ey.com/IN/en/Services/Assurance/Fraud-Investigation---
Dispute-Services/FIDS---A-step-towards-anti-bribery-and-corruption
http://www.smith.williamson.co.uk/anti-bribery-corruption-policy
https://www.google.co.in/search?q=sample+disciplinary+process&ie=utf-
8&oe=utf-8&gws_rd=cr&ei=7cMYV8fYGYXSmwWoqZigCg
https://www.db.com/en/media/Deutsche_Bank_Group_-
_Anti_Money_Laundering_Policy.pdf
http://www.utsystem.edu/cont/Training/FraudAwareness2014.pdf
http://www.ifourtechnolab.com
Thanks
ASP.NET software companies India

More Related Content

What's hot

ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2Tanmay Shinde
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001CUNIX INDIA
 
Comparision of ISO with NIST and COBIT framework
Comparision of ISO with NIST and COBIT frameworkComparision of ISO with NIST and COBIT framework
Comparision of ISO with NIST and COBIT frameworkPooja Soni
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Traininghimalya sharma
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & complianceVandana Verma
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness trainingSAROJ BEHERA
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by SripathiPrajwal Panchmahalkar
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTGaffri Johnson
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentationMidhun Nirmal
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to securityRaghunath G
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromMart Rovers
 
Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
Isms Implementer Course Module 1 Introduction To Information Security
Isms Implementer Course   Module 1   Introduction To Information SecurityIsms Implementer Course   Module 1   Introduction To Information Security
Isms Implementer Course Module 1 Introduction To Information Securityanilchip
 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaiFour Consultancy
 

What's hot (20)

ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001
 
Comparision of ISO with NIST and COBIT framework
Comparision of ISO with NIST and COBIT frameworkComparision of ISO with NIST and COBIT framework
Comparision of ISO with NIST and COBIT framework
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Training
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & compliance
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
A11 part 1
A11 part 1A11 part 1
A11 part 1
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by Sripathi
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to security
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
Isms Implementer Course Module 1 Introduction To Information Security
Isms Implementer Course   Module 1   Introduction To Information SecurityIsms Implementer Course   Module 1   Introduction To Information Security
Isms Implementer Course Module 1 Introduction To Information Security
 
Iso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in indiaIso 27001 2013 clause 6 - planning - by Software development company in india
Iso 27001 2013 clause 6 - planning - by Software development company in india
 
ISO/IEC 27001:2005
ISO/IEC 27001:2005ISO/IEC 27001:2005
ISO/IEC 27001:2005
 

Viewers also liked

ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureUppala Anand
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsUppala Anand
 
ISO Annex SL Clause 7: Support
ISO Annex SL Clause 7: SupportISO Annex SL Clause 7: Support
ISO Annex SL Clause 7: SupportRobert Clements
 
Handover of ISO 27001 Certificate to Ministry of Labour, Kingdom of Saudi Arabia
Handover of ISO 27001 Certificate to Ministry of Labour, Kingdom of Saudi ArabiaHandover of ISO 27001 Certificate to Ministry of Labour, Kingdom of Saudi Arabia
Handover of ISO 27001 Certificate to Ministry of Labour, Kingdom of Saudi ArabiaSamir Ahmed
 
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...PECB
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001PECB
 
ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10Pooja Soni
 

Viewers also liked (8)

ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
ISO Annex SL Clause 7: Support
ISO Annex SL Clause 7: SupportISO Annex SL Clause 7: Support
ISO Annex SL Clause 7: Support
 
Handover of ISO 27001 Certificate to Ministry of Labour, Kingdom of Saudi Arabia
Handover of ISO 27001 Certificate to Ministry of Labour, Kingdom of Saudi ArabiaHandover of ISO 27001 Certificate to Ministry of Labour, Kingdom of Saudi Arabia
Handover of ISO 27001 Certificate to Ministry of Labour, Kingdom of Saudi Arabia
 
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
Privacy Act
Privacy ActPrivacy Act
Privacy Act
 
ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10ISO 270001 : Management Clause -10
ISO 270001 : Management Clause -10
 

Similar to ISO 27001 Control A.7.2 - During Employment Policies

Cyber fraud and Security - What risks does family office's face in today's wo...
Cyber fraud and Security - What risks does family office's face intoday's wo...Cyber fraud and Security - What risks does family office's face intoday's wo...
Cyber fraud and Security - What risks does family office's face in today's wo...Kannan Subbiah
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
Mastering Privacy: The Role of ISO 27701 in Information Security
Mastering Privacy: The Role of ISO 27701 in Information SecurityMastering Privacy: The Role of ISO 27701 in Information Security
Mastering Privacy: The Role of ISO 27701 in Information SecurityShyamMishra72
 
Is Security Team 2 Glba
Is Security Team 2 GlbaIs Security Team 2 Glba
Is Security Team 2 Glbaguestfd062
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guideNA Putra
 
Building Secure Relationships Across the Enterprise
Building Secure Relationships Across the EnterpriseBuilding Secure Relationships Across the Enterprise
Building Secure Relationships Across the EnterpriseForgeRock
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationSyed Azher
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
 
5 Types of Insider Threats and How to Detect them in Your ERP System
5 Types of Insider Threats and How to Detect them in Your ERP System5 Types of Insider Threats and How to Detect them in Your ERP System
5 Types of Insider Threats and How to Detect them in Your ERP SystemMichael Cunningham
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxinfosec train
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementProlifics
 
Achivers_Article title.pptx
Achivers_Article title.pptxAchivers_Article title.pptx
Achivers_Article title.pptxMahtabHashmi2
 
Enhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdfEnhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdfSA Consultants UAE
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 

Similar to ISO 27001 Control A.7.2 - During Employment Policies (20)

Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
Cyber fraud and Security - What risks does family office's face in today's wo...
Cyber fraud and Security - What risks does family office's face intoday's wo...Cyber fraud and Security - What risks does family office's face intoday's wo...
Cyber fraud and Security - What risks does family office's face in today's wo...
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Mastering Privacy: The Role of ISO 27701 in Information Security
Mastering Privacy: The Role of ISO 27701 in Information SecurityMastering Privacy: The Role of ISO 27701 in Information Security
Mastering Privacy: The Role of ISO 27701 in Information Security
 
Is Security Team 2 Glba
Is Security Team 2 GlbaIs Security Team 2 Glba
Is Security Team 2 Glba
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Testing
TestingTesting
Testing
 
Risky business of social media
Risky business of social mediaRisky business of social media
Risky business of social media
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guide
 
Building Secure Relationships Across the Enterprise
Building Secure Relationships Across the EnterpriseBuilding Secure Relationships Across the Enterprise
Building Secure Relationships Across the Enterprise
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an Organisation
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
5 Types of Insider Threats and How to Detect them in Your ERP System
5 Types of Insider Threats and How to Detect them in Your ERP System5 Types of Insider Threats and How to Detect them in Your ERP System
5 Types of Insider Threats and How to Detect them in Your ERP System
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 
Achivers_Article title.pptx
Achivers_Article title.pptxAchivers_Article title.pptx
Achivers_Article title.pptx
 
Enhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdfEnhancing Data Security in Accounting and Bookkeeping Processes.pdf
Enhancing Data Security in Accounting and Bookkeeping Processes.pdf
 
IT Policy
IT PolicyIT Policy
IT Policy
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

ISO 27001 Control A.7.2 - During Employment Policies

  • 1. iFour ConsultancyISO 27001 Control A.7.2 – During Employment
  • 2. A.7.2.1 Management Responsibilities Application of Information Security Policies and Procedures of the Organization Data Protection Policies Anti Money Laundering Policies ASP.NET software companies Indiahttp://www.ifourtechnolab.com
  • 3. Sample Data Protection Policy Data Controller Data Protection Officer Users Personal Information Sensitive Data ASP.NET software companies Indiahttp://www.ifourtechnolab.com
  • 4. Sample Anti Money Laundering Policy  Reject assets that are known or suspected to be the proceeds of criminal activity  Exit from business relationships with individuals or entities known or suspected to be a terrorist or a criminal organisation or member of such or listed on sanction lists  Don’t maintain anonymous accounts, accounts for banks or pay-through accounts  Don’t enter into relationships with clients from Special Risk Countries  Don’t enter into relationships with clients operating in prohibited industries ASP.NET software companies Indiahttp://www.ifourtechnolab.com
  • 5. A.7.2.2 Information Security Awareness, Education and Training Awareness through Education and Training Regular Updates in Policies and Procedures Relevance for job function Fraud Awareness Anti Bribery Education ASP.NET software companies Indiahttp://www.ifourtechnolab.com
  • 6. Sample Fraud Awareness Training Theft Payroll fraud False Expense Reimbursements False invoicing ASP.NET software companies Indiahttp://www.ifourtechnolab.com
  • 7. Sample Anti Bribery Education Understanding and recognising bribery and corruption Penalties Key risk areas Employee responsibility and how to raise a concern ASP.NET software companies Indiahttp://www.ifourtechnolab.com
  • 8. A.7.2.3 Disciplinary Process Formal and communicated disciplinary process Proper implementation of disciplinary process ASP.NET software companies Indiahttp://www.ifourtechnolab.com
  • 9. Sample Disciplinary Process Principles Informal Discussions Verbal Warning Written Warning Final Written Warning Gross Misconduct Right to Appeal ASP.NET software companies Indiahttp://www.ifourtechnolab.com
  • 10. References ASP.NET software companies India https://www.dlapiperdataprotection.com/#handbook/data-protection- officers-section/c1_IN https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&sq i=2&ved=0ahUKEwjDrKPs2J_MAhWF5qYKHXElDFUQFgg4MAM&url=http%3A %2F%2Fwww.harrisvs.org.uk%2Fhome_htm_files%2FData%2520Protection% 2520Policy%2520Model%25202013.doc&usg=AFQjCNH- 258MmJ9tK5Nr0CW7TTRXpgvokA&bvm=bv.119745492,d.dGY&cad=rja https://www.rbi.org.in/scripts/BS_ViewMasCirculardetails.aspx?id=8168 https://www.ncjrs.gov/fraudawareness/ http://www.ifourtechnolab.com
  • 11. References Continued.. ASP.NET software companies India http://www.ey.com/IN/en/Services/Assurance/Fraud-Investigation--- Dispute-Services/FIDS---A-step-towards-anti-bribery-and-corruption http://www.smith.williamson.co.uk/anti-bribery-corruption-policy https://www.google.co.in/search?q=sample+disciplinary+process&ie=utf- 8&oe=utf-8&gws_rd=cr&ei=7cMYV8fYGYXSmwWoqZigCg https://www.db.com/en/media/Deutsche_Bank_Group_- _Anti_Money_Laundering_Policy.pdf http://www.utsystem.edu/cont/Training/FraudAwareness2014.pdf http://www.ifourtechnolab.com

Editor's Notes

  1. ASP.NET software companies India – http://www.ifourtechnolab.com
  2. ASP.NET software companies India – http://www.ifourtechnolab.com
  3. ASP.NET software companies India – http://www.ifourtechnolab.com
  4. ASP.NET software companies India – http://www.ifourtechnolab.com
  5. ASP.NET software companies India – http://www.ifourtechnolab.com
  6. ASP.NET software companies India – http://www.ifourtechnolab.com
  7. ASP.NET software companies India – http://www.ifourtechnolab.com
  8. ASP.NET software companies India – http://www.ifourtechnolab.com
  9. ASP.NET software companies India – http://www.ifourtechnolab.com
  10. ASP.NET software companies India – http://www.ifourtechnolab.com
  11. ASP.NET software companies India – http://www.ifourtechnolab.com
  12. ASP.NET software companies India – http://www.ifourtechnolab.com