The Standardization Zoo or “Who Needs ISO Standards?”

I do not make a pit of murder out of my heart. I consider 90% of the existing standards to be redundant, unnecessary and confusing, or as a colleague of mine once said: “As long as there are different sockets in Euopa, I don’t believe in standardization, certainly not in organization and management.”

This is true for most topics, but especially for organizational topics such as IT governance, records management, and somewhat less so for information security. What once started well and was launched with a lot of enthusiasm (I admit, I was part of it, too..) usually ends up in a flood of well-intentioned, but mostly completely overshooting requirements and specifications, olfactorically influenced by the stable smell of the authors. The reason for this lies primarily in the business model of ISO, but can of course also be explained by the general publishing frenzy in the academic environment, which produces only mass instead of class.

But now in practical terms: Do you use standards, and if so, how? Where do you see a benefit and where would you specifically advise against it? Please send us your opinion. We do not want theoretical feedback, but feedback and experience from real projects.

 

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Related articles

On 16.3. is Digital Cleanup Day

On 16.3. is Digital Cleanup Day

Tidying up is clearly not everyone's cup of tea, but we all know the good feeling that a tidy room, a tidy desk or ... a tidy drive! You can feel proud with a clear conscience, because deleting data also has an important effect on energy consumption. I have calculated...

read more
Dealing with data risks: Data breach notification

Dealing with data risks: Data breach notification

A data breach notification or "data breach notification" refers to the process by which an organization or company is required to notify the relevant data protection authorities and, if applicable, data subjects of a data breach that is likely to result in a high risk...

read more