The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2005 vol.3)
pp: 70-73
E. Michael Power , Gowling Lafleur Henderson LLP
Roland L. Trope , Trope and Schramm LLP
As company-collected data increases in value, it attracts interest from unauthorized persons. Despite this, companies contract with third-parties for routine activities but must be careful how they set up and maintain these outsourcing agreements so they won't harm their business processes or be a target of legal action.
outsourcing relationships, security, regulations, outsource, legal
E. Michael Power, Roland L. Trope, "Averting Security Missteps in Outsourcing", IEEE Security & Privacy, vol.3, no. 2, pp. 70-73, March/April 2005, doi:10.1109/MSP.2005.36
23 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool