Other tasks from the same security theme

Task name
Priority
Policy
Other requirements
Inventory and documentation of data processing agreements
Critical
High
Normal
Low
Data transfer and disclosure
16
requirements

Examples of other requirements this task affects

28. Data processor
GDPR
15.1.2: Addressing security within supplier agreements
ISO 27001
13.2.2: Agreements on information transfer
ISO 27001
A.8.2.4: Infringing instruction
ISO 27701
5.14: Information transfer
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Inventory and documentation of data processing agreements
Documentation of bases for personal data transfer for relevant partners
Critical
High
Normal
Low
Data transfer and disclosure
16
requirements

Examples of other requirements this task affects

44. General principle for transfers
GDPR
45. Transfers on the basis of an adequacy decision
GDPR
46. Transfers subject to appropriate safeguards
GDPR
47. Binding corporate rules
GDPR
48. Transfers or disclosures not authorised by Union law
GDPR
See all related requirements and other information from tasks own page.
Go to >
Documentation of bases for personal data transfer for relevant partners
Documentation of data disclosures for data stores
Critical
High
Normal
Low
Data transfer and disclosure
10
requirements

Examples of other requirements this task affects

30. Records of processing activities
GDPR
28. Data processor
GDPR
12. Transparent information, communication and modalities for the exercise of the rights of the data subject
GDPR
A.6.2: Recording of PII disclosures
ISO 27018
A.7.3.7: PII controllers' obligations to inform third parties
ISO 27701
See all related requirements and other information from tasks own page.
Go to >
Documentation of data disclosures for data stores
Legal bases for personal data transfers between different legal zones
Critical
High
Normal
Low
Data transfer and disclosure
2
requirements

Examples of other requirements this task affects

A.7.5.1: Identity basis for PII transfer between jursdictions
ISO 27701
9.5.3: Management of data transfers to third countries
TISAX
See all related requirements and other information from tasks own page.
Go to >
Legal bases for personal data transfers between different legal zones
Documenting states and international organizations receiving personal data
Critical
High
Normal
Low
Data transfer and disclosure
2
requirements

Examples of other requirements this task affects

A.7.5.2: Countries and international organizations to which PII can be transferred
ISO 27701
A.8.5.2: Countries and international organizations to which PII can be transferred
ISO 27701
See all related requirements and other information from tasks own page.
Go to >
Documenting states and international organizations receiving personal data
Records of personal data transfers to third parties
Critical
High
Normal
Low
Data transfer and disclosure
3
requirements

Examples of other requirements this task affects

A.7.5.3: Records of transfer of PII
ISO 27701
A.8.5.3: Records of PII disclosure to third parties
ISO 27701
9.5.3: Management of data transfers to third countries
TISAX
See all related requirements and other information from tasks own page.
Go to >
Records of personal data transfers to third parties
Records of personal data disclosures to third parties
Critical
High
Normal
Low
Data transfer and disclosure
4
requirements

Examples of other requirements this task affects

A.7.5.4: Records of PII disclosure to third parties
ISO 27701
HAL-07.1: Seuranta ja valvonta - tietojen käyttö ja luovutukset
Julkri
TEK-12.1: Turvallisuuteen liittyvien tapahtumien jäljitettävyys - tietojen luovutukset
Julkri
P6.2: Record of authorized disclosures of personal information
SOC 2
See all related requirements and other information from tasks own page.
Go to >
Records of personal data disclosures to third parties
Rejecting any non-legally binding requests for personal data disclosure
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

A.8.5.5: Legally binding PII disclosures
ISO 27701
See all related requirements and other information from tasks own page.
Go to >
Rejecting any non-legally binding requests for personal data disclosure
Readiness to provide a list of data transfers to the data subject
Critical
High
Normal
Low
Data transfer and disclosure
1
requirements

Examples of other requirements this task affects

P6.7: Providing an accounting of personal information upon data subjects' request
SOC 2
See all related requirements and other information from tasks own page.
Go to >
Readiness to provide a list of data transfers to the data subject

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.