Perform a legitimate interest assessment when legitimate interest is used as the lawful basis for business processes under GDPR.
|
|
As a data controller or processor, align your required record of processing requirements to your activities.
|
|
Identify relevant metrics to assist in evaluating the success of your organization's endpoint protection process.
|
|
Create a succinct, impactful document that summarizes the outcomes from the risk assessment and highlights the IT risk council’s top recommendations to the senior...
|
|
Integrate IT risk management with business risk management by creating a paper trail for key risks.
|
|
Formalizing a risk management program requires creating repeatable and iterative processes, and documenting best practices. Create a comprehensive manual to serve as the...
|
|
The administrative rights policy grants access to individuals’ desktop, laptop, or other end-user devices within a company for those who are qualified and cleared to use...
|
|
The instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging.
|
|
The removable media acceptable use policy defines the standards, procedures, and restrictions for end users who have legitimate business requirements to connect portable...
|
|
The document retention policy ensures that copies of certain documents for legal, regulatory, and/or operations reasons are made, committing companies to good business...
|
|