Skip navigation Spacer Spacer Spacer
Data Protection Logo Spacer Guide to Data Protection Auditing

Data Protection Homepage  Bullet  
Audit Guide Homepage  Bullet  
Download print version  Bullet  

What is a Data Protection Audit? Why Audit? Beginner's guide Step-by-step Process Forms and Checklists Site Map

SpacerPlanning | Preparation: Conducting the Adequacy Audit | Preparation: Compliance Audit | Conducting the Compliance Audit | Audit Execution | Reporting | Audit follow-up

Spacer Spacer

< Previous | Next >
 

Spacer
Spacer

Audit Execution (print ref: Part 3, Section 3.3)

The techniques used during the Compliance Audit will vary depending upon which particular component of the audit is actually being carried out. Recommendations for the most appropriate techniques to use for each component are discussed under the same headings as used for Section 3.2.

Toolbox top border
Spacer

Audit Execution

Spacer
Spacer
Toolbox bottom border


< Previous | Next >

Spacer
Spacer