Security And Privacy Essentials For IT Outsourcing Deals
Managing Risk While Ceding Operational Control
May 16, 2008
Why Read This Report
Global spending on IT services and outsourcing was estimated at $488 billion in 2007 and is predicted to rise an additional 9% in 2008. At $120 billion, IT outsourcing constitutes roughly 25% of this spending. Organizations engaged in outsourcing will require sufficient security and privacy controls to protect their investments and reduce risks to their sensitive information. Security and privacy professionals should be an integral part of the outsourcing process, from developing the request for proposal (RFP) to signing the contract. But the job isn't complete just because the contract has been signed; the outsourcing relationship needs to be monitored, the contract components need to be enforced, and business value needs to be realized.
Already a Client?
Log in to read this document.
Become a Forrester Client
Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.
This report is available for individual purchase ($499 USD).Purchase
Table of Contents
- Increased Outsourcing Carries Greater Security And Privacy Risk
- Bake Security And Privacy Into Outsourcing Relationships From The Start
- How To Ensure Your Outsourcing Deal Includes The Appropriate Security
- Regularly Monitor And Enforce Security And Privacy Contract Provisions
- How To Fund And Optimize Security And Privacy Investments In Outsourcing
WHAT IT MEANS
- Address Security And Privacy Risks When Seeking Savings From Outsourcing
- Supplemental Material
- Related Research Documents
API Design, Part 4: Future-Proof And Secure Your APIs To Fit Your Usage Scenarios
August 21, 2013 | Randy Heffner
Industry Contexts And Constraints Diversify Approaches To Bring-Your-Own-Technology
December 13, 2012 | Connie Moore
It's Time To Tame The ERP Integration Beast
May 5, 2010 | Ken Vollmer