[vc_row type=”grid” video_bg=””][vc_column dp_animation=””][vc_column_text dp_animation=””]

Good Documentation Practices

[/vc_column_text][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column width=”1/2″ dp_animation=””][vc_column_text dp_animation=””]About ISO Standards

ISO standards all contain the same basic premise: Say what you do (formulate manuals and procedure policies), do what you say and document it (create and implement internal forms and necessary documentation). Ultimately, documents are evidence that the actions or tasks have been performed, therefore, all documentation should be concise, legible, accurate, and traceable.

Herein is the definition of good documentation practices.

Concise: Documents must be clearly understood by coworkers or customers
Legible: Easy to read and follow by coworkers or customers
Accurate: Documents must be error free.
Traceable: Each document must be traceable — who recorded it, where and why.

QMS and ISMS records must always be reviewed for Good Document Practices such as, but not limited to:

Contracts, P.O.s, training records, MR minutes, non-conforming records.

Correcting mistakes

  • Errors should be corrected by the person who created them or, if that person is not available, his or her manager.
  • Draw a single line through all errors, thenn sign and date. Example: *Richard Biggs RB 9/15/15 (and if an explanation is needed and there is not enough room to write it next to the error, use the asterisk (*) sign next to the error and the explanation.
    Example: *wrong name

[/vc_column_text][/vc_column][vc_column width=”1/2″ dp_animation=””][vc_column_text dp_animation=””]Document Do’s and Don’t’s

DO’s

  • Verify document before signing
  • Add explanation
  • Check for concisement, legibility, accuracy, and traceability
  • Draw one single line through error
  • Sign and date correction

DON’T’s

  • Have someone sign for you
  • Use liquid paper / white-out
  • Scribble out mistakes
  • Black out mistake
  • Leave blank

[/vc_column_text][/vc_column][/vc_row][vc_row type=”grid” video_bg=”” row_type=”section” bg_image_repeat=”repeat” padding_top=”24″ padding_bottom=”24″][vc_column dp_animation=””][vc_separator][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-left”][/vc_column][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-right”][/vc_column][/vc_row]

case studies

See More Case Studies

Datacenters are a cybersecurity target

I’m a recovering intelligence officer. I’m always a recovering intelligence officer for one trauma or another. And I’ve had the benefit, the pleasure, the honor to apply a lot of those skills I use in defense of our nation in the commercial section and in the commercial world as well, rising all the way to chief operating officer of a company that I thought was pretty obscure.

Learn more

Loss of data hurts everyone

Whether I’m a nation state targeting data, whether I’m a criminal enterprise targeting data, or a transnational organization targeting that, that data is valuable. And while it’s valuable to me, there is a negative externality to the people that I’m taking it from as well. It’s not a victimless crime, right?

Learn more

Datacenters are the obvious target

Anybody ever watch storage wars?
You can go on the dark web and buy drives like you were buying a storage unit. “I’ll give you a thousand dollars for that storage unit”. I know there’s got to be a couple thousand bucks worth of stuff in it. Your data out there is the same way.

Learn more
Contact us

Why risk it alone?
Get started today.

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.
Your benefits:
What happens next?
1

Schedule a call at your convenience

2

We do a discovery and consulting meeting 

3

We prepare a proposal 

Schedule a Free Consultation