IMS (ISO 42001 + ISO 27001) Document Kit

US$999.00

Are you interested in getting certified in ISO/IEC 42001 Implementation or Auditing? Find our discounted trainings at this link.

Description

For any digital product such as this, please refer to our policies found at this link.

Document List

  • IMS Document Completion Tracker
  • ReadMe – How to Customise Documents (PDF)

IMS Manual

  • IMS Scoping Questionnaire
  • IMS Manual
  • ISO 42001 – Implementing ISO 42001 Alignment with ISO 27001 (PPT)

AI System Development

  • AI SDLC Procedure
  • AI System Requirements Form
  • AI System Test Case Specification Form
  • AI Deployment Plan Form
  • AI Performance Monitoring Plan Form
  • AI System Ethical Design Checklist
  • AI System Post Implementation Review Checklist
  • AI System Development Plan Template
  • AI System Development Standard
  • AI System Code Review Checklist
  • AI System Data Bias Assessment Checklist

Audit

  • Audit Questionnaire
  • ISO 42001 Self Assessment
  • Internal Audit Report
  • Audit Plan
  • AIMS Audit – Opening Meeting (PPT)
  • AIMS Audit – Closing Meeting (PPT)
  • Integrated Management System Training (PPT)
  • ISMS ISO 27001 Self Assessment
  • ISO 27001-2022 Audit Plan – Questionnaire

Forms

  • Objectives and KPIs
  • List of Maintained Policies & Procedures
  • Training & Awareness Records
  • Record of Retention and Disposal
  • SOA – Statement of Applicability (ISO 42001)
  • Corrective Action Form
  • Change Management Form
  • Job Description
  • AI Risk Register
  • Management Review Meeting Minutes
  • AI System Impact Assessment
  • Legal & Regulatory Compliance Register
  • List of Interested Parties
  • Risk and Opportunities Register
  • Approved Service Providers or Vendors List
  • Competency Matrix
  • Training Evaluation Form
  • Service Provider or Vendor Evaluation Form
  • Training Plan
  • Stakeholders Mapping
  • Bias Fairness Evaluation
  • Transparency Evaluation
  • Asset Management Register
  • AI Ethics Assessment
  • AI Ethics Monitoring Checklist
  • Model Use Case Tracker
  • Data Quality Assessment Questionnaire
  • PESTLE
  • SWOT
  • SOA – Statement of Applicability (ISO 27001)

Implementation

  • AI Steering Committee TOR
  • AI Governance Board Charter
  • Scope Determination
  • Documents Completion Tracker
  • Implementation Progress Minutes
  • IMS Implementation Project Plan

Policies

  • IMS Policy (Information Security & AI)
  • Acceptable Use Policy
  • Cryptography Policy
  • Access Control Policy
  • Business Continuity Policy
  • AI Tool Usage Policy
  • Asset Management Policy
  • Information Classification Policy
  • Secure System Development Policy
  • Clear Desk Policy
  • Mobile & Teleworking Policy
  • AI Data Privacy and Protection Framework
  • Logging and Monitoring Policy
  • Network Security Management Policy
  • Control of Documented Information
  • Malware and Antivirus Policy
  • AI Communication Management Policy
  • AI Ethics Policy
  • Patch Management Policy
  • Third Party Risk Management Plan
  • Physical and Environmental Security Policy
  • Intellectual Property Rights Policy
  • Cloud Services Management Policy
  • Risk Management Framework

Procedures (SOPs)

  • Corrective Action Procedure
  • AI Data Resource Management Procedure
  • AI System Data Management Procedure
  • Management Review Procedure
  • AI Data Acquisition Procedure
  • Employee Screening Procedure
  • AI Data Quality Management Procedure
  • Control of Records Procedure
  • Access Control Procedure
  • AI Data Preparation Procedure
  • AI Data Provenance Management Procedure
  • Asset Management Procedure
  • Cryptography Procedure
  • Network Security Procedure
  • AI Incident Management and Reporting Concerns Procedure
  • AI Systems Resources Procedure
  • Logging and Monitoring Procedure
  • AI System Impact Assessment Procedure
  • AI Information Transfer Procedure
  • AI Data Quality Procedure
  • AI Processes Monitoring and Measuring Procedure
  • AI Security Threats and Vulnerability Management Procedure
  • Human Oversight

Training & Awareness

  • AI Risk Management (PPT)
  • AI Governance (PPT)
  • Testing AI Principles – A Comprehensive Guide (PPT)
  • Integrated Management Systems Streamlining Standards (PPT)
  • Implementation Guide for AI Management Systems (PPT)
  • The ISO Certification Process Your Complete Guide (PPT)
  • Integrated Management System Implementation Training – Year 1 (PPT)
  • Integrated Management System Implementation Training – Year 2 (PPT)
  • Integrated Management System Implementation Training – Year 3 (PPT)

AI Playbooks

  • AI Hallucination Confabulation Playbook
  • AI Bias Discrimination Playbook
  • AI Data Breach Privacy Playbook
  • Prompt Injection Adversarial Playbook
  • AI System Outage Playbook
  • Model Drift Performance Playbook
  • Shadow AI Unauthorised Use Playbook
  • Third Party AI Vendor Playbook
  • High Stakes Decision Error Playbook
  • Regulatory Compliance Breach Playbook
  • AI Training Data Poisoning Playbook
  • AI Model Theft IP Exfiltration Playbook
  • AI Generated Misinformation Playbook
  • AI Copyright IP Infringement Playbook
  • Deepfake Synthetic Media Attack Playbook
  • AI Explainability Failure Playbook
  • AI Safety Bypass Jailbreak Playbook
  • Autonomous Decision Override Failure Playbook
  • AI Supply Chain Compromise Playbook
  • AI Feedback Loop Amplification Playbook
  • AI Consent Transparency Violation Playbook
  • AI Powered Attack Playbook
  • AI Resource Cost Runaway Playbook
  • AI Multi Agent Coordination Failure Playbook
  • AI Workforce Impact Crisis Playbook
  • AI Reputational Crisis Playbook

Cyber Playbooks

  • Ransomware Attack Playbook
  • Data Breach Exfiltration Playbook
  • Business Email Compromise Playbook
  • Phishing Credential Compromise Playbook
  • Denial of Service DDoS Playbook
  • Insider Threat Playbook
  • Advanced Persistent Threat Playbook
  • Supply Chain Compromise Playbook
  • Cloud Security Incident Playbook
  • Privileged Account Compromise Playbook
  • Malware Virus Outbreak Playbook
  • Web Application Attack Playbook
  • Zero Day Vulnerability Playbook
  • Cryptojacking Resource Hijacking Playbook
  • IoT OT Security Incident Playbook
  • Social Engineering Playbook
  • Mobile Device Compromise Playbook
  • DNS Attack Hijacking Playbook
  • Data Integrity Attack Playbook
  • AI Powered Attack Playbook
  • Website Defacement Playbook
  • Lost Stolen Device Playbook
  • Shadow IT Discovery Playbook
  • Unauthorised Access Intrusion Playbook