Residual Risk Management
Ensure all remaining risks are managed through governance and controls.
Required Evidence
- Completed Five Safes checklist (Appx 10)
- Access control records
- DP sign-off
Step completion requirements
Finish these before marking the step complete:
- Establish data use agreements and access controls.
- Communicate limitations and intended use to recipients.
- Monitor for misuse, breach or re-identification attempts.
- Apply retention and disposal policies consistent with data governance standards.
- Undertake periodic review and re-approval for ongoing use.