United States

Security and Privacy Considerations in Outsourcing

Loading the player...

Security and Privacy Considerations in Outsourcing
Download the audio file to use your device's media player.

From the Advice Worth Keeping podcast series
Hosted by Stan Lepeak, global research director
KPMG LLP Management Consulting


Information protection has become an executive-driven issue. New vectors of threats are accelerating the concern. In the past there were "targets of opportunity" such as ID theft. Now the "targets of choice" have broadened to include intellectual property, financial information and strategic access. Outsourcers are commonly involved or the cause of these breaches.

Greg Bell, a principal in KPMG's Advisory services, outlines the work required to evaluate security and ensure data integrity when sharing information through an outsourcing arrangement.

Listeners will gain an understanding of:

  • Why security expectations must be scoped and written into an outsourcing contract
  • How to retrench information once an outsourcing relationship ends
  • How to prioritize the protection and control of different types of information
  • How to prepare for ever-evolving privacy regulation and legislative obligations




Duration: approximately 11 minutes
Activate the recording with the play button over the image.

For more Advice Worth Keeping, view the full list of podcasts and visit the Advice Worth Keeping blog.

Subscribe via iTunes

Subscribe via RSS