Downloads: 16 | Views: 147 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper | Information Security | United States of America | Volume 13 Issue 10, October 2024 | Popularity: 5.7 / 10
A Comprehensive Framework for Offboarding Third Parties: Mitigating Data Risk and Ensuring Compliance
Vivek Kumar Agarwal
Abstract: The increasing reliance on third - party vendors and contractors has introduced significant data risk and compliance challenges for organizations. The offboarding process, in particular, poses considerable threats to data security and integrity. This paper presents a thorough examination of the current state of third - party offboarding, highlighting the shortcomings of existing practices. We propose a novel framework for offboarding third parties, addressing data deletion, device return, access revocation, contract management, and data retention. Our approach is grounded in a comprehensive review of existing literature, industry standards, and regulatory requirements.
Keywords: third party offboarding, data security, data risk, compliance challenges, contract management
Edition: Volume 13 Issue 10, October 2024
Pages: 559 - 562
DOI: https://www.doi.org/10.21275/SR241006085732
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 246 | Views: 464 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Information Security, India, Volume 8 Issue 11, November 2019
Pages: 95 - 101Intrusion Detection with Machine Learning & Artificial Intelligence (ML&AI) Techniques to Reduce Cyberattacks (Network Traffic) (New Way to Improve Cybersecurity)
S K. Niamathulla
Downloads: 221 | Views: 640 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Information Security, India, Volume 6 Issue 6, June 2017
Pages: 2628 - 2630Improvement of Diffie-Hellman Key Exchange Algorithm
Gurshid
Downloads: 161 | Views: 320 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Information Security, India, Volume 7 Issue 7, July 2018
Pages: 905 - 907The Language of Information Security
Mahesh P G
Downloads: 148 | Views: 291 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Information Security, India, Volume 6 Issue 5, May 2017
Pages: 2678 - 2678Cyber Security - A Business Accelerator??
Riya V S, Dr. Aarthy C
Downloads: 144 | Views: 277 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Information Security, Kenya, Volume 7 Issue 1, January 2018
Pages: 345 - 350Emerging Security Challenges due to Bring Your Own Device Adoption: A Survey of Universities in Kenya
Jairus E. Ounza, Samuel Liyala, Solomon Ogara