What is the 'Privacy Assessment and Program Workflow'?

The workflow below shows detailed steps from the time a Privacy Assessment has been assigned to a recipient via Step 2 of a Program, right through to the Risk and Task Mitigation under Steps 4 and 5 of a program. (The downloadable document is attached to this article.)

mceclip0.png

Back to all articles