Bloomberg BNA
Much has been written about how companies can protect their sensitive information from being compromised by a direct intrusion. But companies also must protect their information when, in the normal course of business, they provide third party vendors access to sensitive information. This article identifies big picture items for a company to consider when negotiating contracts with third party vendors if cybersecurity issues are a material consideration.