International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 16 | Views: 147 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper | Information Security | United States of America | Volume 13 Issue 10, October 2024 | Popularity: 5.7 / 10


     

A Comprehensive Framework for Offboarding Third Parties: Mitigating Data Risk and Ensuring Compliance

Vivek Kumar Agarwal


Abstract: The increasing reliance on third - party vendors and contractors has introduced significant data risk and compliance challenges for organizations. The offboarding process, in particular, poses considerable threats to data security and integrity. This paper presents a thorough examination of the current state of third - party offboarding, highlighting the shortcomings of existing practices. We propose a novel framework for offboarding third parties, addressing data deletion, device return, access revocation, contract management, and data retention. Our approach is grounded in a comprehensive review of existing literature, industry standards, and regulatory requirements.


Keywords: third party offboarding, data security, data risk, compliance challenges, contract management


Edition: Volume 13 Issue 10, October 2024


Pages: 559 - 562


DOI: https://www.doi.org/10.21275/SR241006085732



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Vivek Kumar Agarwal, "A Comprehensive Framework for Offboarding Third Parties: Mitigating Data Risk and Ensuring Compliance", International Journal of Science and Research (IJSR), Volume 13 Issue 10, October 2024, pp. 559-562, URL: https://www.ijsr.net/getabstract.php?paperid=SR241006085732, DOI: https://www.doi.org/10.21275/SR241006085732



Downloads: 246 | Views: 464 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Information Security, India, Volume 8 Issue 11, November 2019

Pages: 95 - 101

Intrusion Detection with Machine Learning & Artificial Intelligence (ML&AI) Techniques to Reduce Cyberattacks (Network Traffic) (New Way to Improve Cybersecurity)

S K. Niamathulla


Downloads: 221 | Views: 640 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Information Security, India, Volume 6 Issue 6, June 2017

Pages: 2628 - 2630

Improvement of Diffie-Hellman Key Exchange Algorithm

Gurshid


Downloads: 161 | Views: 320 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Information Security, India, Volume 7 Issue 7, July 2018

Pages: 905 - 907

The Language of Information Security

Mahesh P G


Downloads: 148 | Views: 291 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Information Security, India, Volume 6 Issue 5, May 2017

Pages: 2678 - 2678

Cyber Security - A Business Accelerator??

Riya V S, Dr. Aarthy C


Downloads: 144 | Views: 277 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Information Security, Kenya, Volume 7 Issue 1, January 2018

Pages: 345 - 350

Emerging Security Challenges due to Bring Your Own Device Adoption: A Survey of Universities in Kenya

Jairus E. Ounza, Samuel Liyala, Solomon Ogara


Top