Sie sind auf Seite 1von 2

iding News,

ov So
Pr

lu
of

tio
ng 10 Years

ns a Inform
nd
ati

march/april2004
july/august 2004 volume
vol. 10,
10, number
issue 4 2 www.environews.com
www.environews.com
br

at
le io
Ce n

Best Management Practices


Third Party Vendor Agreements: The Hidden Security Risks
by Carole Crawford,
The Saturn Partners, Inc.
One of the most
Clients in the environmental
interesting situations we
arena have several security-
experienced was during a
oriented concerns in their
security audit of a large
everyday work, among them
New York law firm. We
hazardous materials risks,
looked at security
OSHA regulations, and others.
policies, disaster recovery
One area that should be closely
plans, physical security
examined is the area of Third
around the network, and
Party Vendor Agreements.
lastly, the Third Party
First of all, when discussing Vendor Agreements.You
security in the network would think that lawyers
environment, what is considered would be the toughest to
a Third Party Vendor? Well, from please when it comes to
work, whether physical
a security standpoint, a TPV contract language.Yet here are
or electronic, were compromised
could be any of the following: just a few examples of security
in any way.
• Software providers holes we found in many
contracts, some with the largest Right-to-Substitute Skilled
• Hardware providers
TPVs in the country. Some of Labor:
• Internet service providers
them may even be This provision was found in
• Telecommunications providers
buried in your own vendor contracts with a very large
• Electrical contractors
contracts. provider of installation or
• HVAC contractors
upgrades of software and
• IT consulting firms Liability Language Scenario 1:
hardware, and it can be very
Depending on the nature of your In several instances, agreements
dangerous. The language allows
business, there could be many were discovered which placed all
for the vendor to “substitute
others. One thing all TPVs have liability squarely on the client,
without knowledge or
in common, however, is and not the vendor, in case of
permission” the personnel
ACCESS – access to your disaster.
assigned to this work when
network, computer rooms, Liability Language Scenario 2: “regular, full time company
electrical systems, electronic Also in several contracts, employees” in the technical
traffic, paper data, network language was included holding positions “are not available.” In
maps, and all sorts of private the vendor harmless if data short order, this means that, on a
and confidential/sensitive data. encountered in the scope of moment’s notice, a contractor

R EPR INTE D WITH PE R M I S S ION FROM N EW E NG LAN D’S E NVI RON M E NT • VOL. 10, IS S U E 4 • J U LY/AUG U ST 2004
can be swapped in that has not a loophole in the language leaves Whether the business is in chem-
been background checked and the client (YOU) wide open for icals, manufacturing, hazardous
who is not an employee of the not only tampering, but systems materials handling, law, health
vendor. Another risky part of this failure and the potential loss of care, engineering or banking, it
type of language in a contract is untold amounts of sensitive data, doesn’t matter. What DOES
that, if the swapped-in technician not to mention revenues. matter is that you know what is
does a good job on the surface but Incredibly, this contract had been IN those contracts gathering dust
problems crop up later, you may signed by the client and had been on the shelf and eliminate any
have a hard time getting the in place for FIVE years! areas of vulnerability. 1
vendor to adhere to contract if
The moral of the story is not Carole Crawford is president of The
things malfunction later. This is
to rip apart all your Third Party Saturn Partners, Inc., a Wisconsin-
due to the next item…
Vendor Agreements. But you may based firm that develops network
Substitute Labor/Not the Same want to check with your attorneys and Internet security policies, delivers
Contract Liability: and IT managers and be sure state-of-the-art design and imple-
In one contract, there was even a these agreements are scanned for mentation of network security archi-
clause stating that if substitute liability language which can harm tectures, and audits disaster recovery
technicians were used in an install your network and business opera- and business continuity plans.
or upgrade, that liability for work tions. Addendums can be written
done on that system “would be to attach to either new or existing For more information, contact Ms.
considered on a case by case agreements to make this adjust- Crawford at (262) 942-3626 or via
basis.” This of course means that ment less painful for both sides. e-mail at cacrawf@saturnpartners.com.

NETWORK SECURITY POLICIES: The Reasons and the Results


Whether it is having court-allowable REASON 1: Expand information secu- REASON 6: Harmonize and coordi-
evidence to prove fraud, theft or negli- rity budget and add more personnel. nate the activities of many workers.
gence, or simply bowing to regulatory
RESULT: Policy development process RESULT: Consistent action is
pressure to have proper written net-
work security policies in place, it is shows management what is needed. required if security is to be maintained.
critical to have these policies not only REASON 2: Establish top manage- REASON 7: Define the boundaries of
in place but updated regularly. permissible action.
ment communication path.
Your policies are your blueprint in RESULT: Workers will clearly under-
RESULT: Participation of manage-
case of disaster; your path to follow stand the boundaries of designated
when training employees in sensitive ment in the development process
opens new channels. responsibilities
positions, your guidebook when it is
time to roll out a new operating sys- REASON 8: Control security relevant
REASON 3: Show definitive progress
tem or expand your enterprise or events in advance.
with minor investment.
management team in any way. RESULT: Increases chances that
RESULT: Only weeks are required to
Solid network security policies are things will be done correctly the first
not to be confused with any type of generate a credible policy document.
time and reduces errors.
“office manual.” Properly written REASON 4: Establish information REASON 9: Exercise control by
policies should reflect all the state of security effort credibility and visibility.
the art technology in place at your exception rather than micromanage-
organization and how to manage it, RESULT: A policy document should ment.
cope with it, protect it and react to have a chief executive officer’s signa- RESULT: Every action and decision
disasters in the network and physical ture on the cover page. does not need to be reviewed.
environment.
REASON 5: Shift worker attitudes REASON 10: Overcome ambiguity
Most important is to realize that out- and change perspectives. that can lead to information overload.
side vendors can have access to pri-
vate data and resources and that they RESULT: The support of all workers RESULT: A policy document will
too must have policies governing who interact with information systems focus workers’ attention on the
them in this process to protect you. is critical. essentials.

R EPR INTE D WITH PE R M I S S ION FROM N EW E NG LAN D’S E NVI RON M E NT • VOL. 10, IS S U E 4 • J U LY/AUG U ST 2004

Das könnte Ihnen auch gefallen