Other tasks from the same security theme

Task name
Priority
Policy
Other requirements
Passing client requirements on to relevant partner organizations
Critical
High
Normal
Low
Security and responsibilities
1
requirements

Examples of other requirements this task affects

9.5.2: Management of contractual obligations with partners
TISAX
See all related requirements and other information from tasks own page.
Go to >
Passing client requirements on to relevant partner organizations
Appointment, tasks and position of a Data Protection Officer (DPO)
Critical
High
Normal
Low
Security and responsibilities
14
requirements

Examples of other requirements this task affects

38. Position of the data protection officer
GDPR
39. Tasks of the data protection officer
GDPR
37. Designation of the data protection officer
GDPR
18.1.4: Privacy and protection of personally identifiable information
ISO 27001
6.6: Yleiset
Omavalvontasuunnitelma
See all related requirements and other information from tasks own page.
Go to >
Appointment, tasks and position of a Data Protection Officer (DPO)
Handling of instructions from controller regarding the processing of personal data
Critical
High
Normal
Low
Security and responsibilities
2
requirements

Examples of other requirements this task affects

9.8.1: Instructions for data processing
TISAX
9.8: Instructions
TISAX
See all related requirements and other information from tasks own page.
Go to >
Handling of instructions from controller regarding the processing of personal data
Notification of the Data Protection Officer
Critical
High
Normal
Low
Security and responsibilities
6
requirements

Examples of other requirements this task affects

37. Designation of the data protection officer
GDPR
6.1.1: Information security roles and responsibilities
ISO 27001
18.2.2: Compliance with security policies and standards
ISO 27001
18.1.4: Privacy and protection of personally identifiable information
ISO 27001
TSU-05.1: Tehtävät ja vastuut - Tietosuojavastaava
Julkri
See all related requirements and other information from tasks own page.
Go to >
Notification of the Data Protection Officer
Data protection monitoring and control plan
Critical
High
Normal
Low
Security and responsibilities
5
requirements

Examples of other requirements this task affects

6.6.1: Tietoturvan ja tietosuojan seuranta ja valvonta
Omavalvontasuunnitelma
12: Digiturvan tilan seuraaminen
Digiturvan kokonaiskuvapalvelu
P8.1: Periodic monitoring of privacy compliance
SOC 2
6.8: Asiakas- ja potilastietojärjestelmien pääsynhallinnan ja käytön seurannan käytännöt
Tietoturvasuunnitelma
9.2.1: Data protection responsibilities
TISAX
See all related requirements and other information from tasks own page.
Go to >
Data protection monitoring and control plan
Safe re-use of data storage space for cloud service customers
Critical
High
Normal
Low
Security and responsibilities
1
requirements

Examples of other requirements this task affects

A.11.13: Access to data on pre-used data storage space
ISO 27018
See all related requirements and other information from tasks own page.
Go to >
Safe re-use of data storage space for cloud service customers
Controls for ensuring the proper recipient of personal data transfer
Critical
High
Normal
Low
Security and responsibilities
3
requirements

Examples of other requirements this task affects

A.12.2: Intended destination of PII
ISO 27018
A.7.4.9: PII transmission controls
ISO 27701
A.8.4.3: PII transmission controls
ISO 27701
See all related requirements and other information from tasks own page.
Go to >
Controls for ensuring the proper recipient of personal data transfer
Joint controller identification and responsibilities
Critical
High
Normal
Low
Security and responsibilities
3
requirements

Examples of other requirements this task affects

A.7.2.7: Joint PII controller
ISO 27701
TSU-03: Yhteisrekisterinpitäjät
Julkri
58: Yhteisrekisterinpitäjyystilanteiden tunnistaminen
Digiturvan kokonaiskuvapalvelu
See all related requirements and other information from tasks own page.
Go to >
Joint controller identification and responsibilities
Organisaation rooli käsiteltyjen henkilötietojen osalta
Critical
High
Normal
Low
Security and responsibilities
2
requirements

Examples of other requirements this task affects

TSU-02: Organisaation roolit
Julkri
56: Organisaation roolin tunnistaminen
Digiturvan kokonaiskuvapalvelu
See all related requirements and other information from tasks own page.
Go to >
Organisaation rooli käsiteltyjen henkilötietojen osalta
Käsittelyn turvallisuuden lisätoimenpiteet erityisiä henkilötietoja käsiteltäessä
Critical
High
Normal
Low
Security and responsibilities
2
requirements

Examples of other requirements this task affects

TSU-13: Käsittelyn turvallisuus
Julkri
6.11: Alusta- ja verkkopalvelujen tietoturvallinen käyttö tietosuojan ja varautumisen kannalta
Tietoturvasuunnitelma
See all related requirements and other information from tasks own page.
Go to >
Käsittelyn turvallisuuden lisätoimenpiteet erityisiä henkilötietoja käsiteltäessä
Vaikutustenarviointiin liittyvä tietosuojaviranomaisen ennakkokuuleminen
Critical
High
Normal
Low
Security and responsibilities
1
requirements

Examples of other requirements this task affects

TSU-17.1: Tietosuojan vaikutustenarviointi - Ennakkokuuleminen
Julkri
See all related requirements and other information from tasks own page.
Go to >
Vaikutustenarviointiin liittyvä tietosuojaviranomaisen ennakkokuuleminen
Appointment of a representative in the Union
Critical
High
Normal
Low
Security and responsibilities
1
requirements

Examples of other requirements this task affects

27. Representatives of controllers or processors not established in the Union
GDPR
See all related requirements and other information from tasks own page.
Go to >
Appointment of a representative in the Union
Partners' data protection commitments and its monitoring
Critical
High
Normal
Low
Security and responsibilities
1
requirements

Examples of other requirements this task affects

P6.4: Obtaining privacy commitments from third parties and assesment of compliance
SOC 2
See all related requirements and other information from tasks own page.
Go to >
Partners' data protection commitments and its monitoring

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.