Personal data can only be collected as necessary to the purpose of use, with limitations on the processing of ‘special data’ and ‘sensitive data.’
Controllers and processors must know the location where personal data is stored or otherwise processed.
Controllers must take adequate security measures to protect personal data from loss, alteration, or unauthorized processing.
Controllers must prevent personal data from being uploaded to personal cloud services and personal devices (BYOD) or enforce the organization’s security measures in personal clouds and devices.
Controllers must know the privacy and security standards the processor adheres to and assess those standards.
Personal data can only be collected as necessary to the purpose of use, with limitations on the processing of ‘special data’ and ‘sensitive data.’
Controllers and processors must know the location where personal data is stored or otherwise processed.
Controllers must take adequate security measures to protect personal data from loss, alteration, or unauthorized processing.
Controllers must prevent personal data from being uploaded to personal cloud services and personal devices (BYOD) or enforce the organization’s security measures in personal clouds and devices.
Controllers must know the privacy and security standards the processor adheres to and assess those standards.