ISMS and the PIMS Consultancy Services team assist in establishing an ISMS or PIMS management system following the PDCA cycle, from Plan - Develop information security/personal information policies, objectives, organization; Do- asset inventory, risk assessment, the establishment of management systems, procedural documentation, business continuity plans, education and training, and advocacy; Check - supervision and measurement, internal audit, management review; Act - Correction of non-conformities and continuous improvement of the management system.
The consultant methodology consists of 7 stages: including management status assessment, management system planning, information asset/ personal information asset file inventory, risk assessment and processing, promotion and publicity, internal audit, management audit, continuous improvement, etc.; also to assist in the introduction of ISMS information security management system or PIMS personal information management system, assist in successfully passing third-party verification, and successfully obtain ISO 27001, ISO27701, BS10012, and other certificates.
ISMS and PIMS
Instructions
Benefits
Highlight the credibilityEnsure operational continuityReduce the risk of personal asset leakageEnhance your brand imageDemonstrate good management responsibilityDemonstrate best practicesStrengthen your competitive advantage
Applicable Objects
The Cyber Security Management Act and Personal Information Protection Act.Enterprises or organizations that want to obtain ISO27001, ISO 27701, and BS10012 certificates.Suitable for all types, sizes, and nature of industries.
Success Stories
Since the establishment of the consulting service team in March 2020, it has guided government agencies, hospitals, schools, the information industry, the broadband network industry, and the cable TV industry. Their achievements are as follows:2 Level-A government agencies6 Level-B government agencies36 Level-C government agencies17 corporate organizations