top of page


1.1
Buy-in from the Top
1.3
Establishment of Reporting Mechanisms
1.2
Appointment of Data Protection Officer / Establishment of Data Protection Office

2. Programme Controls

2.3
-
Risk Assessment,
2.5
-
Handling of Data Breach incident
2.7
2.4
-
Training, Education and Promotion
2.6
-
Data Processor Management
3. Ongoing Assessment and Revision

3.1
Develop an Oversight and Review Plan
3.2
Access and Revise Programme Controls
bottom of page