Understanding Security Audit Requirements in Technology Contracts
Many attorneys representing a client who procures technology from a service provider know to request a security audit, but there is still confusion even among sophisticated technology attorneys about which security audit to request and how to interpret the report once it is received, writes Amanda Witt in an article in Big Data Law Tech blog at Kilpatrick Townsend & Stockton.
The article, reposted by Lexology.com, describes the types of security audits and third-party security certifications that are most frequently requested by customers or offered by vendors.
“As concerns about the security practices of service providers continue to grow with the occurrence of each high profile security breach, the reliance on security audits and security certifications will continue to steadily increase.” she writes.