article thumbnail

New RFP Open for FPRF Project 'Evaluation of Electrical Conductors in Thermal Insulation: Literature Review, Gap Analysis & Development of a Research Plan'

National Fire Protection Association

This phase of the project includes a literature review, gap analysis, and development of a research plan to address the knowledge gaps, which describes any additional modeling and/or testing needed. The guiding principle for this assessment is means by which the technical body can determine if the objective of 310.14(A)(3)

article thumbnail

New RFP Open, Due March 10th for FPRF Project: Evaluation of Electrical Conductors in Thermal Insulation: Literature Review, Gap Analysis & Development of a Research Plan

National Fire Protection Association

This phase of the project includes a literature review, gap analysis and development of a research plan to address the knowledge gaps which describes any additional modeling and/or testing needed. The guiding principle for this assessment is means by which the technical body can determine if the objective of 310.14(A)(3)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ISO 27001 Requirements Checklist: Steps and Tips for Implementation

Reciprocity

The ISO 27001 standard for management of information systems helps organizations of any size to manage the security of data assets such as employee information, financial information, intellectual property, and third-party information. 5 – Information Security Policies. 13 – Communications Security.

article thumbnail

ISO 27001 Certification Requirements & Standards

Reciprocity

The ISO 27001 family, published by the International Organization for Standardization, includes a set of standards for information security. Deciphering the various numbers can be confusing at first, but each standard is numbered and deals with a specific facet of managing your company’s information security risk management efforts.

Audit 52
article thumbnail

Audit Checklist for SOC 2

Reciprocity

Availability: Information and systems are available for operation and use to meet your service organization’s objectives. Confidentiality: Information designated as confidential is protected to meet your service organization’s objectives. Communication and information. Perform a SOC 2 Gap Analysis.

Audit 52
article thumbnail

RTO vs. RPO: What’s the Difference and How are They Used?

Castellan

Of course, there are always exceptions, such as information security tools that should always run.). According to ISO 22300:2021 , a Recovery Point Objective (RPO) is the “point to which information used by an activity is restored to enable the activity to operate on resumption; can also be referred to as ‘maximum data loss.’”.

article thumbnail

5 Steps towards an Actionable Risk Appetite

LogisManager

Conducting a gap analysis with a risk tolerance level will help you identify emerging risks before they rise out of tolerance and it becomes clear that certain mitigation activities are no longer sufficient. After risk assessments are completed, process owners must evaluate results.