Under active development Content is continuously updated and improved

2703.02703.0

>Control Description

The Supplier shall define and implement training and processes for employees and contractors to identify and report suspicious activities and/or behaviour including violations of information security policies and procedures without fear of recrimination. The Supplier shall define and implement a disciplinary process to take action against employees who violate information security policies or procedures.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.