Instant 27001 demo environment

Stakeholder analysis

The following parties have relevance to our information security management system. We have documented their requirements towards information security, as well as any requirements we might have from them.

PartyWhat they expect from usWhat we expect from themCommunication
ShareholdersNo negative press, e.g. as a result of data breaches.Clear and concise requirements with regards to information securityOnce per year, the CISO will distribute (a summary of) this year's Management reviews.
PersonnelProtection of personal dataKnowledge and obedience of all relevant Policies and Procedures.Mile stones and success stories about our ISMS will be communicated through our company news letter.
SuppliersClear and concise requirements with regards to information security-
Clients
  • Protection of confidential and sensitive data
  • ISO 27001 certification
Our certification status is communicated through our web sites, and the topic will be addressed by account managers.
End usersProtection of personal data-

End users are informed about our certification status via our web site. There they can also find our Privacy policy.

Government, supervising authoritiesTo uphold the law and regulations as detailed in Legal and contractual requirements
  • Timely communication on changes in relevant laws
  • A process for reporting data breaches
-