| http://www.w3.org/ns/prov#value | - 11.45 Where the personal information is held on a third party???s hardware, such as cloud storage, and the organisation has instructed the third party to de-identify the personal information, reasonable steps to de-identify the personal information would include taking steps to verify that this has occurred.
|