Proxymity

Third-Party Risk Management

  • Maintain a risk-based assessment and approval process of critical subcontractors to ensure appropriate technical and organisational measures are in place to safeguard the security and confidentiality of data in relation to outsourced services
  • Ensure contracts with critical vendors incorporate the necessary data privacy and security commitments (SCCs) based on the nature and scale of their data processing activities
  • Conduct regular service reviews and risk assessments with critical vendors, ensuring deviations are adequately and promptly addressed

Stay in touch

Stay updated with the latest trends. Sign up for our newsletter.