Skip navigation Spacer Spacer Spacer
Data Protection Logo Spacer Guide to Data Protection Auditing

Data Protection Homepage  Bullet  
Audit Guide Homepage  Bullet  
Download print version  Bullet  

What is a Data Protection Audit? Why Audit? Beginner's guide Step-by-step Process Forms and Checklists Site Map

SpacerPlanning | Preparation: Conducting the Adequacy Audit | Preparation: Compliance Audit | Conducting the Compliance Audit | Audit Execution | Reporting | Audit follow-up

Spacer Spacer

< Previous | Next >
 

Spacer
Spacer

Methodology (print ref: Part 3, Section 5.3)

The choice of methodology for the Follow-up Audit will very much depend upon the scope as described in Section 5.1. If the Follow-up involves checking only documentation then an Adequacy Audit of Section 2.1 would be sufficient. If a site visit is involved because of the seriousness of the Non-compliances, then the Auditor(s) may choose any or all of the Compliance Audit techniques dealt with in Section 3.3, i.e.:

  • System or Vertical Audit
  • Process or Horizontal Audit
  • Staff Awareness Interviews.
Toolbox top border
Spacer

Audit Follow-up

Spacer
Spacer
Toolbox bottom border


< Previous | Next >

Spacer
Spacer