UK Data Protection Toolkit Implementation Guide
5
4.10
Step 10: Information security policies ......................................................................... 26
4.11
Step 11: Further resources ......................................................................................... 27
Conclusion................................................................................................................ 29
www.certikit.com
Page 3 of 29