Security Policy: Difference between revisions
Jump to navigation
Jump to search
m →Policy |
|||
Line 20: | Line 20: | ||
When determining this scope, the organization shall consider: | When determining this scope, the organization shall consider: | ||
:1. the external and internal issues referred to in [[Security_Policy#Understanding_the_organization_and_its_context|1.1]] | |||
:2. the requirements referred to in [[Security_Policy#Understanding_the_needs_and_expectations_of_interested_parties|1.2]] | |||
:3. interfaces and dependencies between activities performed by the organization, and those that are performed by other organizations. | |||
Link to [https://docs.google.com/document/d/1UxPyur5i9tH6FAoKAYOgSSHHg8RsOX8UKOFirMGGHWI/edit?usp=sharing Scope of the ISMS] | Link to [https://docs.google.com/document/d/1UxPyur5i9tH6FAoKAYOgSSHHg8RsOX8UKOFirMGGHWI/edit?usp=sharing Scope of the ISMS] |