Security Policy: Difference between revisions
		
		
		
		Jump to navigation
		Jump to search
		
| m →Policy | |||
| Line 20: | Line 20: | ||
| When determining this scope, the organization shall consider: | When determining this scope, the organization shall consider: | ||
| :1. the external and internal issues referred to in [[Security_Policy#Understanding_the_organization_and_its_context|1.1]] | |||
| :2. the requirements referred to in [[Security_Policy#Understanding_the_needs_and_expectations_of_interested_parties|1.2]] | |||
| :3. interfaces and dependencies between activities performed by the organization, and those that are performed by other organizations. | |||
|     Link to [https://docs.google.com/document/d/1UxPyur5i9tH6FAoKAYOgSSHHg8RsOX8UKOFirMGGHWI/edit?usp=sharing Scope of the ISMS] |     Link to [https://docs.google.com/document/d/1UxPyur5i9tH6FAoKAYOgSSHHg8RsOX8UKOFirMGGHWI/edit?usp=sharing Scope of the ISMS] | ||