Friday, May 06, 2005

Stop! Access restricted by Sandra Gittlen (Network World, 11/15/04) explains why partners in an extended enterprise need to establish agreement on security policies and employ third party audits to ensure compliance.

'Savvy IT executives will spot-check to make sure the partners they've drawn into their extended enterprises are cooperating with agreements, security experts say. Another smart move is going on-site at least once per year, experts agree.'

...

'Regulatory and compliance restrictions make this even more critical, Potts says. If you fall under government mandates such as Graham-Leach-Bliley, the Health Insurance Portability and Accountability Act or Sarbanes-Oxley, then you're legally bound to make sure the data you're sharing is protected - even if it's off your network. '

 


8:43:07 AM    
comment []  trackback []