This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Averting Security Missteps in Outsourcing
March/April 2005 (vol. 3 no. 2)
pp. 70-73
E. Michael Power, Gowling Lafleur Henderson LLP
Roland L. Trope, Trope and Schramm LLP
As company-collected data increases in value, it attracts interest from unauthorized persons. Despite this, companies contract with third-parties for routine activities but must be careful how they set up and maintain these outsourcing agreements so they won't harm their business processes or be a target of legal action.
Index Terms:
outsourcing relationships, security, regulations, outsource, legal
Citation:
E. Michael Power, Roland L. Trope, "Averting Security Missteps in Outsourcing," IEEE Security & Privacy, vol. 3, no. 2, pp. 70-73, March-April 2005, doi:10.1109/MSP.2005.36
Usage of this product signifies your acceptance of the Terms of Use.