Are you at risk from your suppliers mishandling data breaches?
I’ve seen a few suppliers make classic errors dealing with breaches in their client’s data. Here are the top three errors suppliers make and 5 suggestions to avoid them!
Category: Security Management / Accountability
Customer: Government Agency
We worked with a large public sector organisation to document their Technical and Organisational measures. Collating a set of TOMS involves an in-depth examination of existing processes to ensure that they include measures to protect personal data. We capture those measures into a single document, and we identify any gaps that need to be addressed. This process results in the production of a fully evaluated set of TOMS. Once the organisations TOMS were in place, we then helped them to embed them into their supplier contracts, ensuring that suppliers were held to the same standard of accountability as the organisation itself.
Sign-up to receive news and information from Fort Privacy
Fort Privacy processes your personal data in order to respond to your query and provide you with information about our products and services. Please see our Data Protection Statement for further information
I’ve seen a few suppliers make classic errors dealing with breaches in their client’s data. Here are the top three errors suppliers make and 5 suggestions to avoid them!
The General Data Protection Regulation is “risk” based legislation. This means that the protective measures an organisation implements should correspond to the level of risk associated with their data processing activities. It’s worth noting that the risk that should be considered here, is the risk to the data subject as opposed to risk to the business of non-compliance.
Data Protection Programmes are all the rage these days. It’s great to see the compliance conversation moving in this direction. As a Data Protection Officer (DPO), I know the difference between working with a solid data protection programme and working with none and all.