![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Data Protection Homepage |
|
|
![]() |
![]() |
|
![]() |
![]() |
Audit Execution (print ref: Part 3, Section 3.3)The techniques used during the Compliance Audit will vary depending upon which particular component of the audit is actually being carried out. Recommendations for the most appropriate techniques to use for each component are discussed under the same headings as used for Section 3.2. |
|
![]() |
![]() |