First Reference company logo

Inside Internal Controls

News and discussion on implementing risk management

machine cogs image

data managment best practices

What critical elements should appear in every third-party service provider contract?

Whenever data leaves the control perimeter of a company, there is a risk that the data will not be protected at the same level of security that is required by company policy. It is essential that data created, stored, manipulated or transmitted by a third party on the company’s behalf be accorded the level of protection that is defined by the company’s standards and policies.

 

, , , , , , , , , , , , , , , , ,