Questionnaire (estimated time: 5 minutes)

1. Your organisation conducts security assessments or penetration testing regularly to identify vulnerabilities. *

2. You have a documented incident response plan for addressing potential data breaches. *

3. Software and systems are updated frequently to protect against emerging security threats. *

4. You employ technologies or tools to detect and prevent unauthorised access to your systems. *

5. Your business obtains explicit consent from individuals before collecting their personal data. *

6. Data encryption is utilised for both stored and transmitted personal data in your organisation. *

7. Your organisation conducts regular audits of its data protection practices. *

8. Your business has a clear understanding of the types of personal data it collects. *

9. Access controls are managed to ensure only authorised personnel can access sensitive information. *

10. You evaluate third-party vendors' compliance with your data protection standards before engagement. *