• +90 212 702 00 00
  • +90 532 281 01 42
  • I info@muayene.co
trarbgzh-TWenfrkadefaru

Certification Audits

All certification bodies operate in accordance with the conditions and certification standards of the local or foreign accreditation bodies to which they are accredited. When a certification service is to be taken, it should be noted that the organization is accredited. Essentially accreditation studies are also carried out in accordance with the requirements of Section 17021: Conditions - TS EN ISO / IEC 1-1 Conformity assessment - Requirements for organizations providing inspection and certification of management systems. This standard includes the principles and conditions for the adequacy, consistency and impartiality of organizations that provide supervision and certification of management systems, regardless of the sector in which they operate predominantly.

For certification audits, first of all a certification contract is made with the customer requesting certification service and under this agreement, the customer undertakes to comply with the certification body's certification rules.

In accordance with the customer's requirements, the certification body carries out independent audit work on various management systems, product certification (CE marking) and testing and inspection issues, first of all the relevant legal regulations, then within the relevant standards, and if necessary, arranges and delivers the required document.

The certification bodies are responsible for the protection and confidentiality of information that all employees have witnessed. To ensure this, each employee has to make a confidentiality agreement. In the same way, confidentiality of information is also an important undertaking in contracts with customers. The information and documents and the reports issued are only available to authorized persons and are not taken out of the organization in any way.

When information is requested by the authorities to be disclosed to third parties, information is shared under the conditions permitted by legal regulations.

Audit organizations do not have to accept all certification requests from customers. Certification requests are rejected in the following cases:

  • If the certification body is not accredited for the requested certification (but still a certification is required if the customer requests it)
  • If the certification body and certification decision-makers are not available in the certification body
  • If the entity requesting certification has previously worked with another certification body and has not received a certificate,
  • If the company requesting certification is known to have difficulty in paying
  • If the required organization cannot be made in the region where the company requesting certification
  • If the entity requesting certification has requested the audit to reverse the accreditation rules
  • The certification body may also refuse the application for certification for any reason other than

In general, certification work is carried out in two stages. In the first stage, the documentation studies prepared by the customer are reviewed and the conditions specific to the working environment of the customer are evaluated. In addition, second stage studies are planned. In the second stage, the effectiveness and application of the system are evaluated with the studies performed on site. After this phase is completed, the audit report is prepared.

The review and evaluation process is carried out by the certification body management on this report and it is decided whether the document requesting the certificate is given or the document is used if the interim audit is performed. If there are major or minor non-conformities identified during the studies, a decision is not made before the results are obtained.

The main services provided by the certification bodies within the scope of the audits are:

  • ISO 9001: 2015 Quality Management System
  • ISO 22000 Food Safety Management System
  • ISO 14001 Environmental Management System
  • ISO 27001 Information Security Management System
  • ISO / TS 16949 Automotive Quality Management System
  • ISO 50001 Energy Management System
  • OHSAS 18001 Occupational Health and Safety Management System
  • ISO 26000 Social Responsibility Management System
  • ISO 10002 Customer Complaint and Satisfaction Management System
  • ISO 17100 Translation Services Management System
  • ISO 3834 (EN 15085) Welded Manufacturing Qualification Management System
  • HALAL Certificate
  • ECOmark® Ecological Product Certification Program

 

 

Security Audits

As computer technologies evolve, the information technology infrastructures of enterprises become more complex. Therefore, it is necessary to check regularly and to make sure that the system is safe from various threats by performing possible attack simulations. The organizations that serve in this direction use various methodologies and the reports prepared at the end of the studies include the findings and suggestions for improvement. In addition, validation tests are conducted after the arrangements made in this direction and the effectiveness of the measures taken is measured.

Information security aims to protect information in a simple way. However, providing information security is a very comprehensive study. In order to protect the information, the integrity, confidentiality and accessibility features of the information should always be provided. System security, physical security, backup and similar controls should be in place to ensure the security of information in the process from the time the information is produced to the destruction.

Businesses of all sizes make a number of investments in computer infrastructures and establish various security systems in order to ensure information security and data protection. It also requires inspections such as infiltration tests and vulnerability analyzes.

It is not enough to use the most appropriate technology to pass the security audits; The most important point in security audits is not how technologies are used, but how information security is managed.

In order to be able to talk about a solid information security, the company should evaluate its existing data, classify it, be given priority, and have implemented a solid control method by creating a threat, risk and control trilogy in terms of information assets.

Our company provides security audits services to enterprises within the scope of audit services. In this context, our organization provides services in compliance with the relevant legal regulations, standards published by domestic and foreign organizations and generally accepted audit methods. The services provided to enterprises within the framework of security audits are mainly as follows:

  • Penetration tests
  • PCI DSS audits and certification
  • Cobit controls
  • Enterprise-specific security audits
  • IT general controls audits
  • Application controls audits
  • Technical support audits

With these studies, enterprises benefit from all the advantages of security audits.

As access to information becomes easier, the security of information becomes more and more important. In practice, however, it becomes more and more difficult to secure the confidential and critical information that is not accessible to everyone, except for the information that is granted access.

For this reason, the environments in which the information is stored should be regularly tested by experts acting as attackers. In this way, the security of the environment will be increased. For example, the purpose of penetration testing is to strengthen the decisions to make the system more secure. For example, infiltration tests are carried out by simulation tests and the security level and vulnerabilities of the system are revealed in a possible attack. Or vulnerability scans are a security scan to determine which known security vulnerabilities exist on the client, server, applications, and other devices on the network.

 

 

 

Third Party Inspections

An important part of the audit activities consists of second-party and third-party audits. The second party audit is the audits performed by the companies before the supplier companies. The enterprises request second party audit studies in order to review the processes of the supplier companies, examine their activities on the spot, see the applications, understand the application deficiencies, and determine the elimination of process nonconformities by corrective and preventive activities.

Third-party audits are audits conducted by an auditing firm on the request of the enterprises and whether their processes, production activities and applications are based on a certification study or not. Businesses require third-party audits to understand system implementation levels, to identify nonconformities, to see how effectively corrective and preventive actions are being implemented, and to identify the status and points of improvement of their processes.

Third party audits have many benefits to businesses in this respect. These benefits are listed below:

  • It is determined how successful they are in various management system applications.
  • Non-conformities that cannot be detected by the company's own management and control systems are identified.
  • It is ensured that corrective and preventive activities of the enterprise are increased and they are maintained more effectively.
  • The situations of the operational processes are analyzed and points that need to be improved are identified.
  • It is ensured that improvement suggestions submitted to the enterprise for the processes and organizational structure are applied.
  • The efficiency of the company increases with the audits and improvements made.
  • In this way, the costs of the enterprise are reduced and alternative costs are determined.
  • With these studies, the prestige and trust of the enterprise in the market is increasing and gaining reputation.

our organization provides third party audit services to enterprises within the scope of audit services. In this context, our organization, and in compliance with the relevant legal regulations, standards published by domestic and foreign organizations and generally accepted audit methods. Services provided to businesses under third-party audits are mainly:

  • Supplier audits
  • Unannounced inspections
  • Witness inspections
  • Confidential customer controls
  • Loading controls

Businesses with these studies benefits from the audit.

The concept of audit is a concept that is perceived very differently according to the field and activity being audited. In addition to past financial information, enterprises strive to be open and transparent in their production activities. In an environment where consumer rights are increased and protected, companies attach more importance to the production of products and services within defined criteria and standards, as well as the use of generally accepted production methods and technologies.

In this respect, supplier audits, unannounced audits performed at various units and supplier companies, inspections carried out as confidential customers, loading controls and many other audits and controls are important in terms of both producing high quality products and services of enterprises and protecting consumer rights and not creating customer dissatisfaction. it is.