Content library
SOC 2 (Systems and Organization Controls)
P6.5: Notification of unauthorized disclosure of personal information from third parties

How to fill the requirement

SOC 2 (Systems and Organization Controls)

P6.5: Notification of unauthorized disclosure of personal information from third parties

Task name
Priority
Status
Theme
Policy
Other requirements
Management and documentation of data breaches
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Incident management
Data breach management
requirements

Task is fulfilling also these other security requirements

18.1.4: Privacy and protection of personally identifiable information
ISO27 Full
TSU-14: Tietoturvaloukkaukset
Julkri
5.34: Privacy and protection of PII
ISO27k1 Full
66: Tietoturvaloukkausten hallinta
Sec overview
P6.5: Notification of unauthorized disclosure of personal information from third parties
SOC 2
1. Task description

The organization must document all personal data breaches and their consequences and the corrective actions taken, regardless of the action ultimately resulting from the breach.

Failure to comply with the documentation obligation or notification is contrary to GDPR and may lead to sanctions defined on the regulation.

Process for detecting and reporting security breaches related to the supply chain
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Incident management
Data breach management
requirements

Task is fulfilling also these other security requirements

A.10.1: Notification of a data breach involving PII
ISO 27018
DE.CM-6: External service provider activity monitoring
NIST
5.23: Information security for use of cloud services
ISO27k1 Full
P6.5: Notification of unauthorized disclosure of personal information from third parties
SOC 2
21.2.b (incidents): Incident management
NIS2
1. Task description

The organization shall define the procedures for reporting security breaches in the supply chain. The process must take into account all kinds of roles in the supply chain, whether we are the customer of the end product or one supplier in the chain.

Policies shall take into account agreements with partners and customers and their commitments regarding the reporting obligations of both parties.

Inventory and documentation of data processing agreements
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Privacy
Data transfer and disclosure
requirements

Task is fulfilling also these other security requirements

28. Data processor
GDPR
15.1.2: Addressing security within supplier agreements
ISO27 Full
13.2.2: Agreements on information transfer
ISO27 Full
A.8.2.4: Infringing instruction
ISO 27701
5.14: Information transfer
ISO27k1 Full
1. Task description

The processors of personal data (e.g. providers of data systems, other partners using our employee or customer data) and the agreements related to the processing of personal data have been documented. The documentation includes e.g.:

  • Processor name and location
  • Purpose of processing data
  • Status of agreement
Evaluation of data processing agreement for important data processors
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Partner management
Agreements and monitoring
requirements

Task is fulfilling also these other security requirements

28. Data processor
GDPR
15.1.2: Addressing security within supplier agreements
ISO27 Full
TSU-04.1: Henkilötietojen käsittelijä - Sopimukset
Julkri
5.20: Addressing information security within supplier agreements
ISO27k1 Full
P6.5: Notification of unauthorized disclosure of personal information from third parties
SOC 2
1. Task description

Data processing agreements bind the actions of a personal data processing partner.

It can be important for us to require an important partner to take care of e.g. ensuring the confidentiality requirements for its personnel and restricting the use of other processors of personal data in connection with our data.

No items found.