Diligence necessary when dealing with external vendors

Assignment Help Basic Computer Science
Reference no: EM132403816

Just a few years ago, all IT processing took place in-house. Payroll processing, human resources and benefits management, real estate management, and investor relations were done by employees within the parent organization. Even in the home environment, families kept information activities in-house, including annual tax returns and banking (through the writing of paper checks) and disagreements or issues with vendors was taken care of personally. Now we have online resources that push some of that overhead to external vendors. Examples include organizations that will process payroll and benefits administration, and stock brokerages that address investor traffic. Working with vendors brings up a few concerns.

Discuss?the following:

Why is due diligence necessary when dealing with external vendors?

What is one suggestion you have regarding securing data as it is in-transit to and from these vendors?

What are two security protocols that should be part of the vendor's data operations? For example, if the data includes PII/SPII information, is adherence to external regulations and guidelines the responsibility of the vendor or your organization?

Reference no: EM132403816

Questions Cloud

Would you add provisions and protections to your lease : Those attacks result in business shutdowns as well as inability to move goods and use transportation systems.
Discuss risk-costs of compromised data integrity breaches : Discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality.
Legitimate grounds to complain to the general manager : Does Ms. Bowen have legitimate grounds to complain to the general manager and/or file a claim with EEOC?
What must they show to prevail : Can Johnny or his parents file against Trees? What must they show to prevail? Does Trees have any defenses?
Diligence necessary when dealing with external vendors : Why is due diligence necessary when dealing with external vendors? What are two security protocols that should be part of the vendor's data operations?
Discussion of the key skills you will need for chosen career : Identification and discussion of the key skills you will need for your chosen career, including: interpersonal skills and business writing skills
What are the pros and cons of cloud computing : What are the pros and cons of cloud computing? Where could cloud computing fit in the organizational structure and operations?
Was the association decision to spot treat unreasonable : Was the association's decision to spot treat unreasonable? Explain your reasoning.
What is the concentration of the diluted dna : a. What is the concentration of the diluted DNA? b. What is the concentration of the undiluted DNA?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are ways that data can be hidden within storage media

What are some of the ways that data can be hidden within storage media? Describe two methods in detail and possible ways this hidden data can be detected.

  Protect assets and prevent unauthorized access

Strong passwords are necessary to protect assets and prevent unauthorized access. In your own words, describe the 4 components of enforcing password strength.

  University campus with one main campus

Answer the following questions if you were creating a network infrastructure for: 1. A university campus with one main campus 2. A large metropolitan area network 3. A corporate campus with multiple sites across the globe

  Improvement on political correctness

Perhaps you are concerned that political correctness frustrates the exploration of ideas and obscures the search for truth.

  Four ring architecture of operating systems

Opinion regarding what security benefit(s) would be seen if modern operating systems followed four ring architecture.

  Great success in solar energy technologies

The SolarGroup (TSG) has experienced great success in solar energy technologies, but it has reached a point where the information technology (IT) infrastructure, especially with a network infrastructure, is critical to the future of the enterprise..

  Why is consumer spending an important variable

1) Why is consumer spending an important variable in macroeconomics?

  Design an electronic monitoring plan

Using the floor plan of a building you are familiar with, design an electronic monitoring plan that includes closed-circuit television, burglar alarms with appropriate sensors, fire detectors, and fire suppression and physical access controls for ..

  What is the OSI security architecture

What is the OSI security architecture? List and briefly define categories of security services. List and briefly define categories of security mechanisms.

  What average temperature will the heat sink reach

What average temperature will the heat sink reach when the devices dissipate 30 W for the same environmental conditions?

  Record and add narration and timings to a slide show

Describe the various transmission mediums and explain the best use of each with various examples of business use.  Identify communications capabilities of each medium and the types of signals that are used for each.

  Create an inetaddress object associated with this address

You know that the IP address of a computer is "23.14.76.44". Write a statement\ in Java to create an InetAddress object associated with this address.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd