RESOURCE ARTICLE

Third-Party Vendor Management Means Managing Your Own Risk

This series presents nine elements of a successful vendor-management program.


Published: 26 Aug. 2014

Last updated: 19 June 2015

Series Overview

This series presents nine elements of a successful vendor-management program and a checklist to help you, the privacy pro, to manage an effective program. Sometimes themes can help us remember information, so for that reason, we’ll use the solar system to guide us through this series: Picture your company as the star around which all vendors revolve—outer space was so much more appealing than an oceanic theme where sharks circle.

CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Contributors:

K Royal

Global Chief Privacy Officer, Deputy General Counsel, Crawford & Company

CIPP/E, CIPP/US, CIPM, FIP


Tags:

Compliance techData securityIncident managementInternational data transfersProgram managementRegulatory guidanceRisk managementStrategy and governanceFinance and bankingHealth careTechnologyCybersecurity lawPrivacy
RESOURCE ARTICLE

Third-Party Vendor Management Means Managing Your Own Risk

This series presents nine elements of a successful vendor-management program.

Published: 26 Aug. 2014

Last updated: 19 June 2015


Contributors:

K Royal

Global Chief Privacy Officer, Deputy General Counsel, Crawford & Company

CIPP/E, CIPP/US, CIPM, FIP


Series Overview

This series presents nine elements of a successful vendor-management program and a checklist to help you, the privacy pro, to manage an effective program. Sometimes themes can help us remember information, so for that reason, we’ll use the solar system to guide us through this series: Picture your company as the star around which all vendors revolve—outer space was so much more appealing than an oceanic theme where sharks circle.

CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Tags:

Compliance techData securityIncident managementInternational data transfersProgram managementRegulatory guidanceRisk managementStrategy and governanceFinance and bankingHealth careTechnologyCybersecurity lawPrivacy

Related resources