What is the ISO Certification number for Quality Management System?
ISO 9001
What is the ISO Certification number for Information Security, cybersecurity and privacy protection?
ISO 27001
ISO abbreviation meaning
International organization for standardization
Who are our customers?
Everyone we have contact with – clients, employees, suppliers, auditor, aggregators, partnerships, local government bodies
What do you do when you leave your workstation?
Lock your computer
It is a continuous loop of planning, doing, checking and acting. By using this recurring process, we can identify areas for improvement.
Plan, Do, Check, Act
You receive an email from IT asking you to reset your password through a link. What do you do.
Do not click the link; report the email as a phishing attempt to Team Leader and send a ticket right away.
Why do we need to blur our background while on a Teams Meeting?
It helps prevent accidental disclosure of sensitive information
Where can you specifically find the quality and security policies?
3rd floor - pantry entrance
4th floor - pantry entrance
5th floor - prod floor entrance
Knowledge Hub/Ops Site
An employee ignores repeated alerts from their antivirus software, assuming it’s a false alarm.
Could be an actual malware threat. All alerts must be reported. report to Team Leader and send ticket
An ISO auditor comes to your station and asks to take a look at what you're doing, what do you do?
Kindly refuse and let him know that we're not supposed to show due to our ISO security policy.
A former employee's user account is still active two weeks after their departure, and you noticed unauthorized activity under that account. What do you do?
Report it immediately to Team Leader.
Give me 3 examples of security data breach
Give samples
We would look at this reference to learn the requirements for the ISMS
What is ISO 27001?
Meeting minutes are shared in a public Teams channel and include client payment terms.
Sensitive data must only be shared on a need-to-know basis.
What is the Company’s Information Security Policy?
Understand and effectively manage risks related to Information Security to provide greater certainty and confidence for stakeholders.
What is the Company’s Quality Policy?
To operate in a manner that meets or exceeds the requirements set by clients and other stakeholders through continuous improvement by plan, do, check, act.
Who are allowed to be in your Trello Board?
Those who are authorised to be in the board.
what doe 5S stand for? and how many items can we bring to our desks?
Sort, set in order, shine standardize, sustain
5 maximum
Who is David Judge?
Managing Director of Online Specialists Pty Ltd, trading as Affordable Staff, and the CEO of Patchcutters Phils. Inc.
Provide an example of the PDCA within your role
Share your answer
As an employee, what is your role in achieving the Quality Policy?
Assist, cooperate, and actively participate in the achievement of the goals and objectives of the policy.
Client sends you a username and password for a new tool through Microsoft Outlook. What do you do?
Save the password in LastPass. Delete the email. Ask them to share passwords through LastPass.
How do we manage risks relating to information security?
observe, isolate and report potential security breaches
You received an email from a Tradee asking urgency to pay the invoice made yesterday for Lawn Maintenance. What do you do?
Check for details if legit. Confirm and check with your client first. If it is a phishing email, report it to Team Leader and send ticket.