<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://knowledge.adoptech.co.uk/caf-b2.b</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-change-user-permissions</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.6.2-terms-and-conditions-of-employment</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-d2.a</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-9001-quality-management-system-requirements-explained</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a7.10-storage-media</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-223012019-business-continuity-management-explained</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-make-a-check-compliant</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-add-users-to-adoptech</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/communicating-information-security-objectives</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-business-process-maps-are-required-for-iso-9001</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.5.4</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-share-policies-with-the-team</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.5.8-information-security-in-project-management</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.18-use-of-privileged-utility-programs</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-sync-users-with-an-external-app</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/4th-party-dependencies</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.7.14-secure-disposal-or-re-use-of-equipment</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.5.5-contact-with-authorities</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.6.1.2-objectives-for-responsible-development-of-ai-system</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-remove-policies-from-a-test</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-create-tasks-in-adoptech-to-flow-into-jira</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b3.b</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/key-supplier-contact-links</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.8.4-feedback-and-improvement</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-a1.c</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/5.14-information-transfer</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-is-a-business-continuity-plan</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-link-an-uploaded-policy-to-a-control</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.7.8-equipment-siting-and-protection</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.2.4-review-of-the-ai-policy</loc><lastmod>2026-02-09</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b6.a</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.30-outsourced-development</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-set-up-my-cybersmart-integration</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b4.b</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.6.7-remote-working</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/when-i-run-a-test-on-the-control-it-fails</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso/iec-42001-ai-management-system-requirements-explained</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.21-security-of-network-services</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.8.5-secure-authentication</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.2.2-ai-policy</loc><lastmod>2026-02-09</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/nis2-eu-network-information-security-directive-explained</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/adding-a-control</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/do-i-need-to-appoint-a-data-protection-office</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b1.b</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-update-or-delete-my-policies</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/5.26-response-to-information-security-incidents</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/soc-2-security-trust-services-reporting-explained</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/devices-page</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-set-up-my-amazon-s3-integration</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.7.4-ai-system-availability-and-continuity</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.7.2-establishing-processes-functions-and-tools-for-ai-operation</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-information-security-kpis-should-i-set</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.4.2-resource-documentation</loc><lastmod>2026-02-10</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.5.3-documentation-of-ai-system-impact-assessments</loc><lastmod>2026-02-12</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/can-i-use-the-same-api-key-for-all-of-my-aws-integrations</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-technical-services-do-i-need-enabled</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-set-up-my-aws-iam-integration</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b6.b</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-are-the-incident-reporting-requirements-under-dora-digital-operational-resilience-act</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-c2.a</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso/iec-270012022-an-overview</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.29-security-testing-in-development-and-acceptance</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/threat-intel-teams</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.8.32-change-management</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.20-networks-security</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-d1.b</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-set-up-my-microsoft-intune-integration</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b2.a</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-are-the-incident-reporting-requirements-under-caf</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.7.12-cabling-security</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.8.3-information-access-restriction</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.6.2.3-data-for-development-and-testing-of-ai-systems</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://knowledge.adoptech.co.uk</loc><image:image><image:loc>https://143376993.fs1.hubspotusercontent-eu1.net/hubfs/143376993/adoptech-logo-1.png</image:loc><image:caption>adoptechlogo1</image:caption><image:title>adoptechlogo1</image:title></image:image><image:image><image:loc>https://143376993.fs1.hubspotusercontent-eu1.net/hubfs/143376993/Adoptech-logo-GreyWithoutStrapline-1.png</image:loc><image:caption>AdoptechlogoGreyWithoutStrapline1</image:caption><image:title>AdoptechlogoGreyWithoutStrapline1</image:title></image:image><image:image><image:loc>https://143376993.fs1.hubspotusercontent-eu1.net/hubfs/143376993/Top%20section.png</image:loc><image:caption>Topsection</image:caption><image:title>Topsection</image:title></image:image><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.33-test-information</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-set-up-my-teams-integration-for-adoptech-alerts-and-notifications</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-6.6-confidentiality-or-non-disclosure-agreements</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-mark-a-control-as-out-of-scope</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-d2.b</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-are-tests-categories-set</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-c1.b</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-5.10-acceptable-use-of-information-and-other-associated-asset</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.8.3-documenting-ai-system-performance-during-operation</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-a2.c</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.14-redundancy-of-information-processing-facilities</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.15-logging</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.7.2-physical-entry</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b3.c</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-a4.b</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/5.24-information-security-incident-management-planning-and-preparation</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b5.b</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/managing-infosec-risk-in-adoptech</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.34-protection-of-information-systems-during-audit-testing</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/5.9-inventory-of-information-and-other-associated-assets</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.28-secure-coding</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-can-i-check-who-has-read-a-policy</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/clarifying-roles-and-responsibilities</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.8.2-privileged-access-rights</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/5.25-assessment-and-decision-on-information-security-events</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.5.27-learning-from-information-security-incidents</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.8.5-ai-system-decommissioning</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.6.2.4-ai-system-design</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.11-data-masking</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b4.c</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-to-create-a-pci-dss-payment-data-flow-diagram</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.6.1-screening</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-are-good-artificial-intelligence-objectives</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.7.7-clear-desk-and-clear-screen</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.23-web-filtering</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b5.c</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.6.8-information-security-event-reporting</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-set-up-my-google-workspace-integration</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-upload-a-document-to-the-poral</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.8.1-user-endpoint-devices</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b1.a</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.8.4-access-to-source-code</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-can-i-expect-on-the-day-of-an-internal-audit</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-collate-evidence-for-my-audit</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/5.22-monitoring-review-and-change-management-of-supplier-services</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.6.2.5-ai-system-implementation</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-download-a-policy</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.4.5-system-and-computing-resources</loc><lastmod>2026-02-12</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso27001-5.17-authentication-information</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/5.37-documented-operating-procedures</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.9.3-objectives-for-responsible-use-of-ai-systems</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/is-adoptech-free-for-charities</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2027-a.5.33-protection-of-records</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/dora-digital-operational-resilience-act-compliance-independent-assessment</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.8-management-of-technical-vulnerabilities</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.5.5-assessing-societal-impacts-of-ai-systems</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.7.11-supporting-utilities</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-are-good-information-security-objectives</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-can-i-search-for-content-in-the-portal</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.22-segregation-of-networks</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-read-a-policy</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-c1.a</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/control-compliance</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.7.3-securing-offices-rooms-and-facilities</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b3.d</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-to-expect-during-your-cyber-essentials-plus-audit</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/editing-the-text-generated-in-a-policy</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.5.4-assessing-ai-system-impact-on-individuals-and-groups-of-individuals</loc><lastmod>2026-02-12</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.25-secure-development-life-cycle</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-use-the-data-room</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-c1.f</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/common-pci-dss-compensating-control-examples</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-generate-a-policy</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/pci-dss-v4.0-payment-card-security-requirements-explained</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-set-up-my-slack-integration</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-to-authorise-trusthub-access-requests</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso/iec-20000-1-it-service-management-system-explained</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.9.4-intended-use-of-ai-systems</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-a.5.30-ict-readiness-for-business-continuity</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.7.1-physical-security-perimeters</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b4.d</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a7.5-protecting-against-physical-and-environmental-threats</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.16-monitoring-activities</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.5.3</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-are-good-quality-objectives</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/implementing-multi-factor-2fa-authentication</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-ai-kpis-should-i-set</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/do-i-really-need-anti-virus-software</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-log-a-corrective-action</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-d1.a</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.19-installation-of-software-on-operational-systems</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/nist-csf-cybersecurity-framework-risk-management-framework-explained</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/pestel</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/5.21-managing-information-security-in-the-ict-supply-chain</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/subscribing-to-threat-intelligence</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.3.2-ai-roles-and-responsibilities</loc><lastmod>2026-02-10</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-create-an-audit-schedule</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-a.5.35-independent-review</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.6.2.7-ai-system-deployment</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-enable-automated-tests</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.10-information-deletion</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.3.3-reporting-of-concerns</loc><lastmod>2026-02-10</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-connect-the-adoptech-portal-to-azure</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/5.16-identity-management</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.10.3-supplier-requirements-for-ai-systems</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-setup-my-knowbe4-integration</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-delete-a-user</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.8.2-ai-system-incident-management</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/introducing-iso-27001-to-staff</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-can-i-access-an-assessment</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.6.1.3-processes-for-responsible-ai-system-design-and-development</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.10.4-customers-and-ai-systems</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/5.18-access-rights</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-c1.d</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-create-groups</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-create-a-report</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/password-good-practices</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-5.11-return-of-assets</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-add-or-remove-policy-framework-references</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-switch-between-my-companies-in-adoptech</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-to-may-business-functions</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.4.3-data-resources</loc><lastmod>2026-02-10</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.12-data-leakage-prevention</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.8.6-capacity-management</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-setup-a-trusthub-page</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-to-complete-your-pci-dss-saq</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/business-impact-analysis-bia</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/ico-contact-details</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/need-to-change-your-company-or-trading-name</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b3.e</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/steps-to-achieving-cyber-essentials-checklist</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-to-add-a-control-check-to-a-control</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/communication-matrix</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.26-application-security-requirements</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/change-payment-card</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b2.d</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-c1.e</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.4.6-human-resources</loc><lastmod>2026-02-12</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.6.3-information-security-awareness-education-and-training</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/cyber-essentials-uk-cyber-security-certification-explained</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.6.5-responsibilities-after-termination-or-change-of-employment</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-set-up-github-integration</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-is-gdpr</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/ai-records</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.9-configuration-management</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-to-assess-a-vendor-risk</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.2.3-alignment-with-other-organisational-policies</loc><lastmod>2026-02-09</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.7.3-ai-system-operational-procedures</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.13-information-backup</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/kb-404</loc><image:image><image:loc>https://143376993.fs1.hubspotusercontent-eu1.net/hubfs/143376993/Adoptech-logo-GreyWithoutStrapline-1.png</image:loc><image:caption>AdoptechlogoGreyWithoutStrapline1</image:caption><image:title>AdoptechlogoGreyWithoutStrapline1</image:title></image:image><image:image><image:loc>https://143376993.fs1.hubspotusercontent-eu1.net/hubfs/143376993/Top%20section.png</image:loc><image:caption>Topsection</image:caption><image:title>Topsection</image:title></image:image><image:image><image:loc>https://143376993.fs1.hubspotusercontent-eu1.net/hubfs/143376993/adoptech-logo-1.png</image:loc><image:caption>adoptechlogo1</image:caption><image:title>adoptechlogo1</image:title></image:image><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-to-complete-your-ai-register</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-5.13-labelling-of-information</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.7.4-physical-security-monitoring</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/5.15-access-control</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-solve-token-problems-with-the-azure-integration-in-the-adoptech-portal</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.7.9-security-of-assets-off-premises</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-review-a-register</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-to-updated-company-information-displayed-on-a-policy</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-set-a-review-date-for-a-policy</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a-8.7-protection-against-malware</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-a1.a</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/5.20-addressing-information-security-within-supplier-agreements</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-are-compensating-controls-in-pci-dss</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.5.7</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/5.23-information-security-for-use-of-cloud-services</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-environmental-kpis-should-i-set</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-check-who-i-have-sent-an-assessment-to</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.7.13-equipment-maintenance</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/where-can-i-find-a-dpia-template</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-upload-a-certificate-to-adoptech</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/5.12-classification-of-information</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/keep-up-to-date-with-cyber-security-news-and-alerts</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/whay-is-t</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-change-my-password</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-is-the-principle-of-least-privilege-polp</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.24-use-of-cryptography</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/are-discounts-offered-to-start-ups</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/responding-to-an-assessment</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-c1.c</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-a.5.32-intellectual-property</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-a3.a</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.7.6-ai-system-change-management</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-140012015-environmental-management-system-explained</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/hipaa-health-information-privacy-security-compliance-explained</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-a.5.31-legal-statutory-regulatory-and-contractual-requirements</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-is-the-agenda-for-our-iso-management-review-meeting</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/cyber-assessment-framework-caf-ncsc-cyber-resilience-requirements-explained</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-a4.a</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b2.c</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/understanding-caf-indicators-of-good-practice-scoring</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-set-up-my-phishing-tackle-integration</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/5.19-information-security-in-supplier-relationships</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-is-an-impacts-aspects</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.8.31</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-are-good-environmental-objectives</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-set-up-my-amazon-guardduty-integration</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-quality-kpis-should-i-set</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-set-up-my-jira-integration</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.6.2.2-ai-system-requirements-and-specification</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-view-an-assessment-response</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.5.2-information-security-roles-and-responsibilities</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.6.2.8-ai-system-documentation</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.27-secure-system-architecture-and-engineering-principles</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-a.5.36-compliance</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.9.2-processes-for-responsible-use-of-ai-systems</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.6.4-disciplinary-process</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b3.a</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-d1.c</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-a2.a</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-a1.b</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/sending-an-assessment-to-a-third-party</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/adding-a-company-logo</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/which-iso-27001-controls-can-i-put-out-of-scope-if-i-do-not-have-an-office</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/nist-sp-800-53-security-privacy-controls-framework-explained</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-create-a-report-0</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-are-common-bcp-threats-to-an-sme-</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b4.a</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-a.5.29</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.7.5-ai-system-monitoring</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.5.6</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-is-an-environmental-aspects-and-impacts-register</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/a.8.17-clock-synchronization</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-is-an-acquirer-in-pci-dss</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2027-a.5.34-privacy-and-protection-pii</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-make-a-control-compliant</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-a2.b</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/caf-b5.a</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/kb-search-results</loc><image:image><image:loc>https://143376993.fs1.hubspotusercontent-eu1.net/hubfs/143376993/adoptech-logo-1.png</image:loc><image:caption>adoptechlogo1</image:caption><image:title>adoptechlogo1</image:title></image:image><image:image><image:loc>https://143376993.fs1.hubspotusercontent-eu1.net/hubfs/143376993/Top%20section.png</image:loc><image:caption>Topsection</image:caption><image:title>Topsection</image:title></image:image><image:image><image:loc>https://143376993.fs1.hubspotusercontent-eu1.net/hubfs/143376993/Adoptech-logo-GreyWithoutStrapline-1.png</image:loc><image:caption>AdoptechlogoGreyWithoutStrapline1</image:caption><image:title>AdoptechlogoGreyWithoutStrapline1</image:title></image:image><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.6.2.6-ai-system-verification-and-validation</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-log-an-incident</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/what-legislation-do-i-need-to-add-to-the-legal-register</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.10.2-allocating-responsibilities-for-ai-systems</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-a.5.28-collection-of-evidence</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/leavers-confidentiality-reminder</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/adoptech-data-privacy-framework-gdpr-global-data-protection-compliance-explained</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.7.6-working-in-secure-areas</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-27001-2022-a.5.1-policies-for-information-security</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.5.2-ai-system-impact-assessment-process</loc><lastmod>2026-02-12</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/iso-42001-2023-a.4.4-tooling-resources</loc><lastmod>2026-02-10</lastmod></url><url><loc>https://knowledge.adoptech.co.uk/how-do-i-create-a-new-control-check</loc><lastmod>2026-02-04</lastmod></url></urlset>