"Uncontrolled access to data, with no audit trail of activity and no oversight, would be going too far. This applies to both commercial and government use of data about people.”
—John Poindexter
9. External Audit
Get Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.