8.1 Operation Planning and
control:
The planning of
the processes to meet the requirement of the customer is achieved through the various
procedures and the statement of applicability.
These
documents describes: -
(a)
Sequence of
operations and sub operations required to realise the services.
(b)
The control on the processes and the activity as
applicable.
(c)
The description of the non-applicability of the
control points.
8.2 Information
Security Risk assessment
The risk
assessment are done / reviewed at least once a year to assess the risk level in
the Information security management system applicable for the scope of
services.
The record of the
risk assessment of the various areas is maintained in the form of Risk
assessment record.
8.3:
Information security Risk treatment
(a) The risk
treatment is done as per the procedure ref. No. DOC 4.1 issue 01.
(b)The record of this effect
shall be maintained.
User questions & answers