top of page

Privacy Management Program

1.1
Buy-in from the Top
1.3
Establishment of Reporting Mechanisms
1.2
Appointment of Data Protection Officer / Establishment of Data Protection Office

2. Programme Controls

2.3
Risk Assessment,
2.5
Handling of Data Breach incident
2.4
Training, Education and Promotion
2.6
Data Processor Management
3. Ongoing Assessment and Revision

3.1
Develop an Oversight and Review Plan
3.2
Access and Revise Programme Controls
bottom of page