Why implement it?
- Adoption of an appropriate model for implementing, monitoring and reviewing all personal identity information in the ISMS;
- Compliance with regulations
- Acting in the areas of telecommunications, application security, protection of the physical environment, HR, licensing and business continuity;
- Definition of rules/requirements and adoption of controls regarding personally identifiable information.