How should Third‑Party Cyber Risk be managed under UK GDPR?

 

Third‑party cyber risk should be assessed, monitored, and documented based on the personal data suppliers handle.

Why this matters

Suppliers are a common source of GDPR breaches.

Key controls

  • Due diligence before onboarding
  • Security and GDPR clauses in contracts
  • Ongoing monitoring

Role of IT

  • Assess technical controls and use security features
  • Flag high‑risk vendors
  • Support procurement decisions

Evidence regulators expect

  • Supplier risk management
  • Incident handling processes