![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Data Protection Homepage |
|
|
![]() |
![]() |
|
![]() |
![]() |
Audit Evidence (print ref: Part 2, Section 1.3)It should be apparent from the previous sections that Internal and External audits are looking for evidence concerning different aspects of a data protection system. These different aspects relate back to the original Audit Objectives detailed in Section 3 of Part 1 and are summarised in the table below:
The above table should help to make the distinction between Adequacy and Compliance Audits even clearer, i.e.
|
|
![]() |
![]() |