Over the past three decades, I've done work for a wide range of organizations to help them identify the storage locations for all forms of their business information (including customer, client, patient, and employee information). One of the key activities to accomplish this is identifying and documenting all vendors, contractors, business associates, service providers, business partners, and all other types of outsourced entities that possess or have any other type of access to the information.
After doing related vendor assessments for hundreds of organizations, I've found fewer of them than I can count on my fingers that accurately knew and had documented all their outsourced entities. Why? There are a wide range of reasons. Some of the most common I’ve heard include:
Not knowing who possesses, or accesses, your information, in any form, is a huge risk, not only to the applicable individuals about whom the information applies, but also to your organization—putting your business at great risk of liability for the mistakes or malicious activities of those mystery third parties.
After all these years, I am still hearing way too many organizations state something very similar to: "We outsourced so we wouldn't be liable for the security of the information when it is under the care of the outsourced entity." It simply does not work that way, folks; for many reasons. Here are a couple of high-level reasons.
Reason #1: Laws and regulations establish your responsibilities outsourced activities.
A few of the laws and regulations that contain requirements, either directly or implied, for performing business partner security program reviews, which establish responsibility on your part for you to know who your outsourced entities are to begin with, include:
• Health Insurance Portability and Accountability Act (HIPAA)
• EU General Data Protection Regulation (GDPR)
• US Department of Defense's (DoD) Cybersecurity Maturity Model Certification (CMMC)
• Gramm Leach Bliley Act (GLBA)
• Sarbanes Oxley (SOX) Act
• Federal Trade Commission (FTC) Act
• Fair and Accurate Credit Transactions Act (FACTA)
• Internal Revenue Code (IRC) Section 7612
• U.S. state breach notice laws
And the list could go on for several pages.
Reason #2: Your published policies may obligate your organization to track all contracted entities.
Do you know what your organization's outward-facing (on websites, social media sites, etc.) privacy notice/policy and security policy promise? Do you know what the privacy and security notices that are sent to your customers, employees, patients, and possibly even general consumers say? Do they say something similar to one or more of the following actual policy statements I've seen?
If you are making these promises, then you are expected to ensure that all the contracted entities to whom you entrust the information keep these promises that you made. Your promise follows the information. How many of your contracted entities are complying with the promises you've made to your customers, patients, employees, and consumers? How do you know?
How will you know if your contracted entities have had a breach involving the personal information you've entrusted to them if you don't even know the entities that access or possess that personal information? How will you know if your contracted entities are appropriately protecting information if you don't even know all the entities performing contracted information storage, processing, and other types of access? If you haven't documented all your outsourced entities, then you don't know, and it is likely those many unknown entities are not following your policies; they are breaches and liabilities just waiting to happen.
All organizations need to identify and document all the outsourced and contracted entities that possess or otherwise access their information, in all forms. After identifying them, make sure that they have appropriate controls in place, and then establish an oversight method so you can demonstrate due diligence. Then, in the event they have some type of security incident and/or a privacy breach, you will be able to more efficiently communicate and coordinate with them, you will have documented evidence that you did all you could to ensure all hands secured the information appropriately, and you also will have limited your liability as much as possible.
Here are some additional items to help you keep track of your own contracted entities (vendors, contractors, business associates, brokers, etc.):
This article appeared originally at Privacy and Security Brainiacs.