top of page
Privacy Management Program
1.1
Buy-in from the Top
1.3
Establishment of Reporting Mechanisms
1.2
Appointment of Data Protection Officer / Establishment of Data Protection Office
2. Programme Controls
2.3
Risk Assessment Tools
2.5
Handling of Data Breach incident
2.4
Training, Education and Promotion
2.6
Data Processor Management
3. Ongoing Assessment and Revision
3.1
Develop an Oversight and Review Plan
3.2
Access and Revise Programme Controls
bottom of page