At jacando we firmly believe that security isn't just a feature; it's our foundation. Our commitment to robust security measures isn't just about protecting data; it's about safeguarding trust.
Compliance @jacando via Vanta
Ensuring the protection of our customer-related data is of utmost importance for our company. It is crucial that we ensure all information collected about our customers is used only for the necessary purposes.
Google Cloud Security
Insight into jacando’s security poilicies – Information handling
Our path to ISO 27001 certification
Last updated on 04.09.2024
Defining preparation and responsibilities
Development of measures to deal with the identified risks. This can include the implementation of security controls, processes and guidelines.
Carry out initial analysis
Assessment of the current status of information security in the company. This includes the identification of assets, threats, vulnerabilities and risks.
Definition of the scope of application
Definition of the scope of application of the ISMS, i.e. which parts of the company and which information is to be covered.
Carry out risk assessment
Identification and assessment of risks in connection with the company's information and information systems of the company. This includes the definition of risk assessment criteria and the prioritization of risks.
Definition of risk assessment criteria
Prioritization of risks
Plan risk treatment
Development of measures to deal with the identified risks. This can include the implementation of security controls, processes and guidelines.
Documentation and implementation of controls
Creation of documents such as guidelines, procedural instructions and controls that fulfill the security requirements of ISO 27001. These controls should aim to mitigate the identified risks.
Carry out internal audits
Conduct internal audits to ensure that the ISMS meets the requirements of the ISO 27001 standard and functions effectively.
Conduct management review
Regular assessment of the ISMS by management to ensure that it is appropriately implemented and effective. This includes reviewing key performance indicators and identifying opportunities for improvement.
Review of KPIs
Identification of opportunities for improvement
Certification preparation
Preparation for certification by an accredited certification body. This can include a comprehensive review of the ISMS and documentation of conformity with the ISO 27001 standard.
Obtaining and maintaining certification
Carrying out the certification audits by an external certification body and obtaining ISO 27001 certification. The ISMS must be continuously monitored and improved in order to maintain certification.