ISO 28001:2007 pdf download

ISO 28001:2007 pdf download.Security management systems for the supply chain一Best practices for implementing supply chain security,assessments and plans一Requirements and guidance
3.12 international supply chain
supply chain that at some point crosses an international or economic border
NOTE 1 All portions of this chain are considered intemational from the time a purchase order is concluded to the point where the goods are released from customs control in the destination country or economy.
NOTE 2 If treaties or regional agreements have eliminated customs clearance of goods from specified countries or economies, the end of the international supply chain is the port of entry into the destination country or economy where the goods would have cleared customs if the agreements or treaties had not been in place.
3.13 likelihood
ease or difficulty with which a security threat scenario could progress to become a security incident
NOTE Likelihood is evaluated based on the resistance the security processes in place pose to a security incident involving the security threat scenario being examined and is expressed either qualitatively or quantitatively.
3.14 management system
organization's structure for managing its processes or activities that transform inputs of resources into a product or service, which meet the organization's objectives
NOTE It is not the intent of this International Standard to specify a specific management system or require the creation of a separate security management system. ISO 9001 (Quality Management Systems), ISO 14001 (Environmental Management Systems), ISO 28000 (Security management systems for the supply chain), and the International Maritime Organization's International Safety Management (ISM) Code are examples of management systems.
3.18 security declaration
documented commitment by a business partner, which specifies security measures implemented by that business partner, including, at a minimum, how goods and physical instruments of international trade are safeguarded, associated information is protected and security measures are demonstrated and verified
NOTE It will be used by the organization in the supply chain to evaluate the adequacy of security measures related to the security of goods.
3.19 security plan
planned arrangements for ensuring that security is adequately managed
NOTE 1 It is designed to ensure the application of measures that protect the organization from a security incident.
NOTE 2 The plan can be incorporated into other operational plans.
3.23 security sensitive information security sensitive materials
information or materials, produced by or incorporated into the supply chain security process, that contain information about the security processes, shipments or government directives that would not be readily available to the public and would be useful to someone wishing to initiate a security incident
3.24 supply chain
linked set of resources and processes that upon placement of a purchase order begins with the sourcing of raw material and extends through the manufacturing, processing, handling and delivery of goods and related services to the purchaser.ISO 28001 pdf download.

Download
Download

匿名

Comment

Anonymous