Data processing partner listing and owner assignment
The organization must maintain a list of partners who have access to confidential information. System vendors and processors of personal data are listed separately from other stakeholders because they play an active role in the processing of data.
See an example process description from task's page
Connected other frameworks and requirements:
26. Joint controllers
44. General principle for transfers
8.1.1: Inventory of assets
13.2.2: Agreements on information transfer
No items found.
Stay up-to-date on cyber security
Subscribe for our free, weekly newsletter
Get a weekly digest with most important cybersec news, new Academy content and next week's free webinars.
Kiitos! Saat vielä vahvistuksen sähköpostiisi.
Valitettavasti tietojasi ei voitu lähettää eteenpäin.
* Your email won't be sold nor disclosed forward. Confirmation has more info. Learn more