ACPL-IsMS-C5.36 Compliance With Policies, Rules and Standards For Information Security

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Compliance with policies, rules and standards

for information security Policy

Document ID ACPL-ISMS-C5.36
Document Classification Internal
Issue Date (effective from) 01.12.2023
Version No 1.0
Latest Review Date 01.12.2023

Nitin Gupta Kunal Parikh Vijay Gupta

CISO Director Director

Prepared By Reviewed By Approved By


Compliance with policies, rules and standards for information security

1. Control statement:

Compliance with the organization’s information security policy, topic-specific policies, rules and
standards should be regularly reviewed.

2. Purpose:

To ensure that information security is implemented and operated in accordance with the
organization’s information security policy, topic-specific policies, rules and standards.

3. Scope:

This policy covers the Method for Review of Information Security Policies & other standards
Requirements and ensuring that all the requirements are met.

4. Procedure:

If any non-compliance is found as a result of the review, managers should:

a) Identify the causes of the non-compliance;

b) Evaluate the need for corrective actions to a Results of reviews and corrective actions carried out
by the information owners or as per procedural requirements and recorded and these records are
maintained. Managers should report the results to the persons carrying out independent reviews
when an independent review takes place in the area of their responsibility.

Corrective actions should be completed in a timely manner as appropriate to the risk. If not
completed by the next scheduled review, progress should at least be addressed at that review to
achieve compliance;

c) Implement appropriate corrective actions;

d) Review corrective actions taken to verify its effectiveness and identify any deficiencies or
weaknesses

Results of reviews and corrective actions carried out by information owners or as defined in the
respective procedure, should be recorded and these records should be maintained. Functional heads
should report the results to the persons carrying out independent reviews when an independent
review takes place in the area of their responsibility.

Doc ID: ACPL-ISMS-C5.36 Version 1.0 Last Rev. Date: 01.12.2023 Page 2 of 3

This document is confidential and must not be shared or copied without written permission from
Aethereus Consulting. Please return or destroy upon request.
Compliance with policies, rules and standards for information security

Corrective actions are completed in a timely manner as appropriate to the risk. If not completed by
the next scheduled review, progress should at least be addressed at that review.

5. References:

1. Internal Audit Checklist (self audit): Doc.5.35-F-04

6. Revision History

Revision Date Description Author


1.0 01.12.2023 Initial release CISO

Doc ID: ACPL-ISMS-C5.36 Version 1.0 Last Rev. Date: 01.12.2023 Page 3 of 3

This document is confidential and must not be shared or copied without written permission from
Aethereus Consulting. Please return or destroy upon request.

You might also like