Cybersecurity & Data Protection Governance

Mechanisms exist to compel data and/or process owners to obtain authorization for the production use of each system, application and/or service under their control.


Login