Such verification and analysis usually consists in sending a verification form. It may also consist in submitting to the administrator relevant documentation applicable to the processor privacy policy, terms of service, audit reports, ISO certificates). Then, their thorough analysis should become the basis for the decision whether an entrustment agreement […]