Third-Party Access and Usage Policy

Subscriber Content

This sample policy is designed to help organizations determine whether combined third-party and company systems meet or exceed all security requirements.

In this sample, all information systems related to outsourcing contracts must be reviewed and approved by appropriate management. These contracts must sufficiently define information security responsibilities, as well as how to respond to a variety of potential security problems. All such contracts must allow a company to terminate the contract for cause if it can be shown that the outsourcing firm does not abide by the information security terms of the contract.

Free Trial

Sign up for a free, no-obligation trial to start exploring our timesaving, valuable resources.