Issue No.02 - March/April (2005 vol.3)
E. Michael Power , Gowling Lafleur Henderson LLP
Roland L. Trope , Trope and Schramm LLP
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2005.36
As company-collected data increases in value, it attracts interest from unauthorized persons. Despite this, companies contract with third-parties for routine activities but must be careful how they set up and maintain these outsourcing agreements so they won't harm their business processes or be a target of legal action.
outsourcing relationships, security, regulations, outsource, legal
E. Michael Power, Roland L. Trope, "Averting Security Missteps in Outsourcing", IEEE Security & Privacy, vol.3, no. 2, pp. 70-73, March/April 2005, doi:10.1109/MSP.2005.36