RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Larry Medina <[log in to unmask]>
Reply To:
Records Management Program <[log in to unmask]>
Date:
Tue, 6 Aug 2013 08:19:05 -0700
Content-Type:
text/plain
Parts/Attachments:
text/plain (30 lines)
A good article, some of the best advice (for those of us using service
providers to stored data and/or paper records) is in this section:

Monitoring Third Parties and Supply Chain Vendors

Companies need to monitor third parties and companies in their supply chain
as part of any security and privacy compliance program, as both of these
represent major areas of vulnerability in security and privacy compliance.
For the most-critical third-party vendors, security assessments should be
performed, including an assessment of protocols vendors have in place for
responding to a security breach. Critical vendors should also be considered
in a company's incident-response plan.


http://www.mondaq.com/unitedstates/x/255410/Data+Protection+Privacy/Into+The+Breach+Managing+Cyber+Security+Threats+In+The+Digital+Age&email_access=on


Larry
[log in to unmask]

-- 
*Lawrence J. Medina
Danville, CA
RIM Professional since 1972*

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]

ATOM RSS1 RSS2