Module 2a: (1) Controller v Processor - how to differentiate

Поделиться
HTML-код
  • Опубликовано: 28 июн 2024
  • Get Data Protection Fit series
    Module 2a: controller v processor - how to differentiate (session 1 of 5)
    Kirsten Whitfield, Director, Privacy Security & Information Law Group at Fieldfisher

Комментарии • 2

  • @Tola_A
    @Tola_A 11 месяцев назад

    Very clear explanation. Thank you!

  • @31ETV
    @31ETV 3 года назад

    Very clear video. Please could you expand on how to determine if a relationship is joint-controller? ICO and EDPB only use clear cut examples which are of little use.