Assessment of a third-party vendor for the vendor’s privacy and information security policies, access controls, where the personal information will be held and who has access to it. Privacy/security questionnaires, privacy impact assessments and other checklists can be used to assess this risk.
Vendor Management
Tags:
Related Stories
Tech vendor looks to tackle data localization compliance
Peter Yared had an idea to address data localization three years ago. There were not many signs it would become a hot compliance topic, but Yared knew it was only a matter of time.
Back then, data localization laws primarily existed in authoritarian countries, and Yared's colleagues in Silicon Vall...
How Privacy Tech Is Bought and Deployed
For the second year running, the IAPP together with TrustArc surveyed 345 privacy professionals around the globe to gain an understanding of how privacy technology products are purchased and deployed within an organization. Results this year shine a light on which products are in use and under whose...