Skip navigation Spacer Spacer Spacer
Data Protection Logo Spacer Guide to Data Protection Auditing

Data Protection Homepage  Bullet  
Audit Guide Homepage  Bullet  
Download print version  Bullet  

What is a Data Protection Audit? Why Audit? Beginner's guide Step-by-step Process Forms and Checklists Site Map

SpacerPlanning | Preparation: Conducting the Adequacy Audit | Preparation: Compliance Audit | Conducting the Compliance Audit | Audit Execution | Reporting | Audit follow-up

Spacer Spacer

< Previous | Next >
 

Spacer
Spacer

Carry out Risk Assessment (print ref: Part 3, Section 1.1)

Experienced auditors will want to conduct a full risk assessment to determine which areas are to be audited and with what frequency before drawing up the Audit Schedule of section 1.2. A straightforward method for carrying this out will be found in Annex A if required.

Novice auditors or organisations that are introducing internal Data Protection Audits for the first time can adopt a much simpler practice which is to ensure that every function or area is audited within a particular timeframe such as perhaps at least once per year.

Toolbox top border
Spacer

Planning

Spacer
Spacer
Toolbox bottom border


< Previous | Next >

Spacer
Spacer