How to: Protect Sensitive Data Used by Third-party Vendors
The author offers several safeguards businesses should take when outsourcing to third-party vendors, so that information security measures are maximized.
Computer security, Management
Silver, Josh, "How to: Protect Sensitive Data Used by Third-party Vendors" (2015). Maine News Index – MaineBiz. 6515.
Full text is not available here. Please contact the Library for a copy of the article.