Is the Enterprise or the Third-Party Vendor Responsible for a Privacy Breach?
Boston, MA (PRWEB) January 28, 2010 -- In a recent blog by Boston-based research and consulting firm, ZeroPoint Risk Research, chief executive officer MacDonnell Ulsch addressed the issue of responsibility for an information breach within a corporation. Does the obligation for privacy lie with the third-party vendor or the principal company?
The use of a recognized third-party service provider does not absolve the principal company from maintaining a progressive information privacy program. Nor does it exonerate the third-party vendor. For example, the new Massachusetts privacy law, 201 CMR 17.00, requires that both entities with access to personally identifiable information are accountable.
The requirement to protect information is risk-based and is modeled on the U.S. Federal Trade Commission’s Safeguards Rule. |
“Making sure that third-party vendors meet an acceptable level of information security,” Ulsch continued, “one consistent with the requirements mandated for the principal entity, is one of the more critical decisions a company will make. The regulators will hold companies accountable. But so will the courts in the event of a damaging breach and any resulting litigation. It is the principal company that must make sure that its third-party providers meet a defined, agreed upon standard. This should raise several questions for companies as third-party firms are assessed. Can the vendor meet the same risk-based requirements as the principal company on a continuing basis? What is satisfactory demonstration of proof? In kidnapping cases, there is ‘proof of life,’ a phrase that addresses proof that the kidnap victim is alive. In this case, what is an acceptable proof of security? What standard must be met? What is a reasonable test? How often should the third-party be tested? How are results verified? This may sound simple, but what if the provider is half-way around the world?”
Ulsch said, “Every organization, whether in managing regulatory compliance for federal or state requirements, needs a privacy and security strategy. A haphazard approach to ensuring information integrity is a high-risk. It’s never too late to assess your strategy, approach to security, and level of risk, even after the date of compliance. For 201 CMR 17.00, that is March 1, 2010. We’re almost there. Are you ready?”
Contact: Susan Shea, Media Relations Director
Phone: 617-878-2144
Email: susan.shea(at)ZeroPointRisk(dot)com
###
See Also:
- Active Innovations, Inc. Releases Version 8 of its Flagship Document Management Software Platform, infoRouter
- USOBA to Speak at Debt Buyers’ Association International Conference
- Assisted Senior Living Releases New Tool For Finding Assisted Living Facilities And Other Senior Care
- ChildRC.com Features “Acclimating To College Life In A Wheelchair”
- Exclusive Interview with Digital WarRoom� Founder on BlogTalkRadio for MyLegal.com
[Via Legal / Law]
No comments:
Post a Comment