Here are the controls implemented at undefined to ensure compliance, as a part of our security program.
Termination of Employment
Multi-factor Authentication
Inventory of Infrastructure Assets
Choice & Consent
Data Subject Access
Impact analysis
Limit Network Connections
Transmission Confidentiality
Anomalous Behavior
Data used in Testing
Conspicuous Link To Privacy Notice
Code of Business Conduct
Organizational Structure
Roles & Responsibilities
Competency Screening
Personnel Screening
New Hire Policy Acknowledgement
Security & Privacy Awareness
Performance Review
Periodic Policy Acknowledgement
Automated Reporting
Incident Reporting Assistance
Risk Framing
Risk Assessment
Fraud
Assigned Cybersecurity & Privacy Responsibilities
Segregates Roles and Responsibilities
Data Protection Impact Assessment (DPIA)
Data Protection Officer (DPO)
Retention of Policies
Chief Privacy Officer (CPO)
Privacy Act Statements
Asset Ownership Assignment
Infosec training ack
New Hire Security & Privacy Training Records
Periodic Security & Privacy Training Records
Inventory of Endpoint Assets