0% found this document useful (0 votes)
65 views2 pages

Transmission of PII Procedure

This document outlines G42's procedure for transmitting personally identifiable information (PII) electronically. It assigns responsibilities for agreeing transmission terms, reviewing logs, and validating privacy impact assessments. The procedure specifies that PII transmission must be encrypted according to security guidelines. Logs of transmission system use are reviewed by the Management System Owner to ensure integrity of received PII.

Uploaded by

Bay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views2 pages

Transmission of PII Procedure

This document outlines G42's procedure for transmitting personally identifiable information (PII) electronically. It assigns responsibilities for agreeing transmission terms, reviewing logs, and validating privacy impact assessments. The procedure specifies that PII transmission must be encrypted according to security guidelines. Logs of transmission system use are reviewed by the Management System Owner to ensure integrity of received PII.

Uploaded by

Bay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Transmission of PII Procedure

DocumentKits Issue No: 1.0 Organisation Issue No:

DocumentKits Issue Date: 26/06/2020 Organisation Issue Date:

1. Scope

All transmission of personally identifiable information (PII) by electronic means is subject to this procedure.
PII transfers and disclosures to other legal jurisdictions are further controlled under the International PII
Transfers Procedure.

2. Responsibilities

are responsible for agreeing the terms of transmissions with partners and suppliers.

The Management System Owner (MSO) is responsible for reviewing logs of PII transmission.

The Data Protection Officer is responsible for validating that privacy impact assessments (PIAs) account for
transmission of PII and the mechanisms used.

The IT Team is responsible for configuring transmission mechanisms.

3. Procedure

3.1 From time to time, G42 transmits PII to

3.2 The PII to be transmitted and the schedule for doing so is determined by each processing activity, and is
thus subject to PIA (Privacy Impact Assessment Procedure).

3.3 Contracts with partners, suppliers and customers set out the PII that will be transmitted, the mechanism
by which it will be transmitted and the frequency of any such transmissions.

3.4 G42 uses to transfer PII

3.4.1 Work instructions for are available here:

G42
Classification_1,Classification_2,Classification_3,Classification_4
This document contains material that is distributed under licence from IT Governance Publishing Ltd.
3.5 PII transmitted is encrypted in accordance with the Information Security and Privacy Classification
Guidelines.

3.6 Receipt of PII is confirmed

3.7 Integrity of PII on receipt is validated

3.8 G42 limits access to transmission systems on the basis of least privilege – only those with a confirmed
need to use transmission systems are permitted access.

3.8.1

3.9 Use of transmission systems is logged


3.10 Logs are reviewed by Management System Owner (MSO)

Document owner and approval

The Management System Owner (MSO) is the owner of this document and is responsible for ensuring that it
is reviewed in line with the requirements of the management system.

The current version of this document is available to and is published

Its approval status can be viewed in the Master List of Document Approval.

G42
Classification_1,Classification_2,Classification_3,Classification_4
This document contains material that is distributed under licence from IT Governance Publishing Ltd.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy