Glossary
Minimisation
transferring only data strictly necessary for the purpose — reduced the attack surface.
Learn More
RegTech
—
Case Study 17.2: Cornerstone's Schrems II Response — Renegotiating Data Transfers Post-Privacy Shield
Related Terms
"The SaaS CTO Security Checklist"
(a) Definitions
(a) Scope and Inventory
(b) Metrics and Thresholds
(b) Reporting Obligations
(c) Governance and Escalation
(c) Violation Thresholds and Notification
(d) Remediation Process