ISMS and PIMS

Instructions

ISMS and the PIMS Consultancy Services team assist in establishing an ISMS or PIMS management system following the PDCA cycle, from Plan - Develop information security/personal information policies, objectives, organization; Do- asset inventory, risk assessment, the establishment of management systems, procedural documentation, business continuity plans, education and training, and advocacy; Check - supervision and measurement, internal audit, management review; Act - Correction of non-conformities and continuous improvement of the management system.

The consultant methodology consists of 7 stages: including management status assessment, management system planning, information asset/ personal information asset file inventory, risk assessment and processing, promotion and publicity, internal audit, management audit, continuous improvement, etc.; also to assist in the introduction of ISMS information security management system or PIMS personal information management system, assist in successfully passing third-party verification, and successfully obtain ISO 27001, ISO27701, BS10012, and other certificates.

Benefits

Highlight the credibility

Ensure operational continuity

Reduce the risk of personal asset leakage

Enhance your brand image

Demonstrate good management responsibility

Demonstrate best practicesStrengthen your competitive advantage

Applicable Objects

The Cyber Security Management Act and Personal Information Protection Act.

Enterprises or organizations that want to obtain ISO27001, ISO 27701, and BS10012 certificates.

Suitable for all types, sizes, and nature of industries.

Success Stories

Since the establishment of the consulting service team in March 2020, it has guided government agencies, hospitals, schools, the information industry, the broadband network industry, and the cable TV industry. Their achievements are as follows:

2 Level-A government agencies

6 Level-B government agencies

36 Level-C government agencies

17 corporate organizations