Under active development Content is continuously updated and improved

Article 28.7(c)Article 28.7(c)

>Control Description

ICT third-party service provider’s evidenced weaknesses pertaining to its overall ICT risk management and in particular in the way it ensures the availability, authenticity, integrity and, confidentiality, of data, whether personal or otherwise sensitive data, or non-personal data;

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.