Advisor

Protect Outsourced PII by Streamlining Compliance

Posted November 3, 2009 | Leadership | Leadership |

In an outsourcing arrangement, many of the risks to personally identifiable information (PII) are the same as for internally processed information. Controlling the spread of PII within the outsourcer's IT environment is key, as is ensuring that access controls are effectively used, the outsourcers networks are secure, and encryption is used in association with organizational sensitive data and PII. Even administrative controls, such as employee background checks, have applicability in an outsourcing arrangement.

About The Author
Stephen McCalmont
Stephen A. McCalmont is Chairman and CEO of Avior Computing. Before Avior, Mr. McCalmont founded Altaworks and Net2Net (now merged with Visual Networks). Altaworks produced a system management application for IBM's WebSphere and BEA's WebLogic environments. Net2Net produced a network management system for Asynchronous Transfer Mode networks. Customers included AT&T, MCI, Sprint, HP, and Network General. With his previous two companies, he… Read More
Jeri Teller-Kanzler
Jeri Teller-Kanzler, CISM, is President and Principal Consultant for Risk-MAPP, LLC. She is also an adjunct professor at the Rochester Institute of Technology. Before forming Risk-MAPP, Ms. Teller-Kanzler provided senior-level consulting services to Xerox, implementing an enterprise-wide risk management process and providing guidance in the development of a SOX compliance program. She is a former VP and regional CISO at Citigroup, where she was… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.