Search
Search our content by date or relevance.

Achieving accreditation as a small company
Su Chantry, Clinical Director at SKC Occupational Health, outlines her journey to ISO 15189 accreditation.

Dealing with incorrect information
In our latest dilemma, find out what to do when a company appears to have supplied duplicate testing images in order to meet the delivery requirement.

It all starts with study
Mitch Beedie, a freelance researcher/writer, suggests a study, decide, plan, do (SDPD) cycle.

Preventing the recurrence of a nonconformance
Ravindiran Gurusamy, IRCA Certificated Associate Auditor, offers an overview of nonconformance and the corrective action process for management system standards.

Avoiding auditing pitfalls
Stanley O'Donnell IRCA Principal Auditor, has conducted audits globally in a variety of industries including aerospace, medical, oil and gas, to name a few. He has experienced many pitfalls when auditing and shares some of the obstacle’s auditors should avoid.

Selecting the right problem-solving strategy
Derek Scott, CQP FCQI, Quality Manager at Rubberatkins, Scotland, takes a look at models and strategies for problem-solving.

Essentials for a safe on-site audit
Sharjeel Farooq, IRCA Principal Auditor, and Director of Advanced Certifications Pvt Limited in Pakistan, shares his experience and advice on how to hold a safe on-site audit during the Covid-19 pandemic.

Engagement of people
Raffat Khatoon Mohammed, CQP MCQI, ISO 9001, 14001 and 45001 Lead Auditor at Qatar Primary Materials Company (QPMC), explains how ‘engagement of people’ helped QPMC to overcome staff and skill shortages during the Covid-19 pandemic.

Uncovering a case of bid rigging
In our latest dilemma, find out what to do when an auditor observes possible fraudulent behaviour unrelated to the audit.

ISO/IEC TS 27022:2021 – Information technology – Guidance on information security management system processes
Richard Green, CQP FCQI, Managing Director of Kingsford Consultancy Services, UK, outlines the newest guidance on information security implementation and operation.