Supplier Surveillance Procedures


Book Description







ISO 9001:2015 Audit Procedures


Book Description

Revised and fully, ISO 9001:2015 Audit Procedures describes the methods for completing management reviews and quality audits and describes the changes made to the standards for 2015 and how they are likely to impact on your own audit procedures. Now in its fourth edition, this text includes essential material on process models, generic processes and detailed coverage of auditor questionnaires. Part II includes a series of useful checklists to assist auditors in compiling their own systems and individual audit check sheets. The whole text is also supported with a glossary of terms as well as explanations of acronyms and abbreviations used in quality. ISO 9001:2015 Audit Procedures is for auditors of small businesses looking to complete a quality audit review for the 2015 standards. This book will also prove invaluable to all professional auditors completing internal, external and third party audits.




A Comprehensive Guide to the NIST Cybersecurity Framework 2.0


Book Description

Learn to enhance your organization’s cybersecurit y through the NIST Cybersecurit y Framework in this invaluable and accessible guide The National Institute of Standards and Technology (NIST) Cybersecurity Framework, produced in response to a 2014 US Presidential directive, has proven essential in standardizing approaches to cybersecurity risk and producing an efficient, adaptable toolkit for meeting cyber threats. As these threats have multiplied and escalated in recent years, this framework has evolved to meet new needs and reflect new best practices, and now has an international footprint. There has never been a greater need for cybersecurity professionals to understand this framework, its applications, and its potential. A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 offers a vital introduction to this NIST framework and its implementation. Highlighting significant updates from the first version of the NIST framework, it works through each of the framework’s functions in turn, in language both beginners and experienced professionals can grasp. Replete with compliance and implementation strategies, it proves indispensable for the next generation of cybersecurity professionals. A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 readers will also find: Clear, jargon-free language for both beginning and advanced readers Detailed discussion of all NIST framework components, including Govern, Identify, Protect, Detect, Respond, and Recover Hundreds of actionable recommendations for immediate implementation by cybersecurity professionals at all levels A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 is ideal for cybersecurity professionals, business leaders and executives, IT consultants and advisors, and students and academics focused on the study of cybersecurity, information technology, or related fields.




The Supply Chain Imperative


Book Description

Annotation Companies in every industry have shown an admirable new commitment to higher ethical standards and have worked hard to build or restore solid reputations and stakeholder trust. But all their best efforts may be undermined if the many links in their supply chains do not follow suit. The Supply Chain Imperative helps companies avoid costly litigation and potentially devastating injury to reputation brought on by violations of law and ethical norms. The author has created a framework any business can use for monitoring, reporting, and improving performance of suppliers on environmental, social, and other issues. It ensures that the company's ethical mandate is understood and implemented along the entire length of the chain. This timely book clarifies: * The importance of maintaining an ethical supply chain * The new rules, problems, and responsibilities that businesses now face * Strategic concerns * How to use information technology in the ethical supply chain program * How to make the business case for action * And more The new business imperative is to create an unambiguous culture of ethical behavior. Here is the key to making sure that mandate is followed at every turn.







Tool and Manufacturing Engineers Handbook: Continuous Improvement


Book Description

Part of the renowned TMEH Series, the book contains hundreds of practical new ways to make continuous improvement work, and keep on working: quality management guidelines, quality and productivity improvement ideas, cost reduction tips, continuous process improvement, plus how to use world class techniques such as TPM, TQM, benchmarking, JIT, activity-based costing, improving customer/supplier relationships, and more. You'll also learn from "best practices" examples for quality training, teamwork, empowerment, self-assessment using Baldrige Quality Award criteria, ISO 9000 audits and certification, and more.







Monthly Catalog of United States Government Publications


Book Description

February issue includes Appendix entitled Directory of United States Government periodicals and subscription publications; September issue includes List of depository libraries; June and December issues include semiannual index




Data Security for Health Care


Book Description

The efficiency of modern health care relies more and more upon a computerised infrastructure. Open distributed information systems have started to bring professionals together from all over the world. On the one hand easy processing and communication of images, sound and texts will help to visualize and therefore treat illnesses and diseases efficiently, on the other hand the very ease of access and use can threaten patient privacy, accountability and health care professional secrecy. Developments in community care are responsible for the fact that many aspects of patient care are delivered outside the closed walls of a hospital and hence patient records must also be accessible and updated throughout the community. Therefore, the introduction of information technology should focus primarily on the improvement of the health of patients or, at least, not putting patients' health at risk. This means that the right data has to be available to the right person at the right time (availability). Information technology deeply affects the confidential relationship between patient and doctor, since it increasingly surrounds and mediates it. Information systems in health care establishments are increasingly developing towards an integrated system where various users can interact and communicate. The process of integration will cross the borders of local health care establishments and it will progressively expand, e.g., into patients' homes, into a European health care community, in order to support the mobility of patients, the exchange of medical and administrational data, transfer of bills and money.