Issue No. 02 - March/April (2005 vol. 3)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2005.36
E. Michael Power , Gowling Lafleur Henderson LLP
Roland L. Trope , Trope and Schramm LLP
As company-collected data increases in value, it attracts interest from unauthorized persons. Despite this, companies contract with third-parties for routine activities but must be careful how they set up and maintain these outsourcing agreements so they won't harm their business processes or be a target of legal action.
outsourcing relationships, security, regulations, outsource, legal
E. M. Power and R. L. Trope, "Averting Security Missteps in Outsourcing," in IEEE Security & Privacy, vol. 3, no. , pp. 70-73, 2005.