76 Should Are employees with computer systems access aware of and receive training about information technology system policies, procedures, and security standards; and is employee training documented and retained? Select all that apply. Employees trained, Training material sufficient, Training documented and retained, Nothing in place Determine if there is a program to train employees who usesystems about the security methods and controls in place. Training should be documented in either a training log or the employees personnel file. Ask employees who use systems about their knowledge of security methods.
77 Should Is an employee who violates or abuses the information technology policies and procedures subject to disciplinary action? Yes, No Determine if there is a program to appropriately discipline an employee who has violated IT security procedures.
Photographs: The auditor will take these photographs during the audit
Auditor Actions Photograph Required Auditor Requirement
78 Text Comment and Photograph Front of building including signage. Describe the front of the factory building including any signage.
79 Text Comment and Photograph Guard station(s) and access gates. Describe the guard station and facility access gates.
80 Text Comment and Photograph Building structures. Describe the buildings and structures for this location.
81 Text Comment and Photograph Shipping and receiving area. Describe the shipping and receiving areas.
82 Text Comment and Photograph Final packaging area. Describe the final packaging area.
83 Text Comment and Photograph Signed Opening Meeting Letter. Did the Factory Representative and the Auditor sign the Opening Meeting Letter?
Question Category Definition
Critical The facility must possess the security requirement indicated. If not performed, the facility will received a Corrective Action Plan that requires evidence that the security improvement was made within 60 days.
Must The facility must possess the security requirement indicated. If not performed, the facility will received a Corrective Action Plan that requires providing within 60 days a specific Action Plan and completion date to have the security requirement performed.
Should The facility should possess the security requirement indicated. Some are considered a Security Best Practice. If not performed, the facility is asked to improve security by implementing the requirement. A Corrective Action Plan is not necessary.