Article 28.7(c)—Article 28.7(c)
>Control Description
ICT third-party service provider’s evidenced weaknesses pertaining to its overall ICT risk management and in particular in the way it ensures the availability, authenticity, integrity and, confidentiality, of data, whether personal or otherwise sensitive data, or non-personal data;
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.