|
Post by juthi52943 on Jan 4, 2024 10:37:07 GMT
A methods of their processing. It can be compared to your money in a bank account - the bank physically holds it, but you decide what to do with it. Typical examples of processors include external accounting offices, marketing agencies, security companies, IT companies - all external entities that have access to personal data owned by another company. An it is the owner administrator who decides what Job Function Email List will happen to personal data. For example, a security guard employed to guard a building cannot use the surveillance footage for his own purposes, such as posting it on his Facebook profile. Data Protection Officer DPO The law allows and even encourages the transfer of supervision over the personal data protection system to a natural person acting as a DPO. The data protection officer may be a person from within the organization a full-time employee or from outside it so-called outsourcing IOD. In practice, the IOD ensures that all obligations imposed on the Personal Data Protection Officer by law are fulfilled. However, it is not the task of the IOD to perform all the tasks of the Personal Data Protection Officer ensuring compliance with the information obligation.
|
|