Five Considerations on Service Providers' Privacy and Security Cyber

or to bookmark this page

Click here to bookmark this page

Click here to remove bookmark

Five Considerations on Service Providers' Privacy and Security

Five Considerations on Service Providers Privacy and Security

Understanding who you share data with and how they will utilize and protect it has never been more critical. Privacy and security continue to be a top priority for regulators around the world and organizations are advised to stay abreast and take appropriate measures to comply. There is growing awareness that the weakest link may be organizations’ service providers (or vendors) that have access to their environment, and may be collecting, processing and storing protected personal information on organizations’ behalf. Due to COVID-19 and other macro-economic trends, the number of service providers utilized by organizations continues to grow. Below are key considerations when considering privacy, security and your service providers.

Privacy and Security Risks Are a Growing Concern in Organizations’ Service Provider Management Program

Privacy and security concerns are considered top priority in an organization’s service provider risk management program. According to Kroll’s 2019/20 Global Fraud and Risk Report 73% of executives identified reputational damages caused by third parties as a risk priority and nearly 30% reported that third-party incidents significantly affected their organization in the last year.1  

Privacy regulators are requiring more action by companies when it comes to their service providers. Both the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) and the subsequent California Privacy Rights Act (CPRA) make it clear that an organization is fully responsible for the service providers within their supply chains and the onus is on those organizations to ensure compliance.2 Many companies don’t appreciate the significance of this mandate and have taken little to no steps to ensure their compliance and minimized this risk.

Cyber Security of Your Service Providers Must Be Addressed Under Many Regulations

Cyber security regulators, such as the New York State Department of Financial Services, SEC, CFTC and HIPAA specifically require organizations to have a program that mandates service providers meet specific security controls. This challenge, which increases exponentially for each service provider that has access to protected personal information under an organization’s control, requires a certain level of expertise beyond what many internal IT departments can handle. Identifying, validating and analyzing service providers’ cyber security posture is no longer a luxury, but a necessity.

Privacy Focused Regulations Are Also Sounding the Alarm

An effective privacy program cannot exist without information security. While many privacy regulations do not require specific technical security controls, they require organizations to implement and maintain “reasonable” security measures to protect against foreseeable risk and ensure service providers that handle protected personal information meet them as well. May U.S. states and countries around the world have begun considering laws like GDPR and CCPA and adopting similar language, increasing the need for organizations to act.

Failure Has a Real Cost and Is Expensive

Fines for violating privacy regulations are increasing. In a 12-month period, European regulators issued over $190 million in fines to companies who have violated GDPR.3 Some of these fines have been issued in part due to the failure of the service provider, such as in the case of Ticketmaster when a third-party application was given access to protected data.4

The above list is not exhaustive. But it is a good starting point. Organizations are advised to conduct a thorough service provider risk assessment to identify and classify their service providers according to the security and privacy risks they pose to the organization and take real and concrete steps to minimize these risks. We predict that the regulatory interest in privacy and information security will not subside any time soon and the changes for organizations will only continue to grow.

2 provider-management-potential-gaps-in-your-privacy-compliance-strategy/

Five Considerations on Service Providers' Privacy and Security 2021-04-12T00:00:00.0000000 /en-ca/insights/publications/cyber/five-considerations-service-providers-privacy-security /-/media/kroll/images/publications/featured-images/2019/5-considerations-service-providers-privacy-security.jpg publication {E39587AD-8F0B-4FE2-865F-969BC5501096} {6AE34745-2D7F-4BA8-AB90-FD5CF83E8DC7} {058CEC4B-AB74-4982-A8CC-B399FCB93BB2} {EF1B7ABE-2357-44B0-BBE4-F8D4CDA62BAC} {3A077BFC-C74A-40AF-A14C-13BCF6E3873E} {911A8E3E-0E6C-4303-A7D0-63E02AA205CF} {CE2347F0-D222-4014-BA97-6A415CC633DF} {9B1D3D09-0913-4DF6-9717-5F30A36A4F95}


Cyber Risk

Global, end-to-end cyber risk solutions.

Cyber Risk

Virtual CISO Advisory Services

Services to help teams safeguard information assets while supporting business operations.

Virtual CISO Advisory Services

Cyber Risk Assessments

Delivering actionable recommendations using the best technology and expertise available.

Cyber Risk Assessments

24x7 Incident Response

Compliant notifications, reputation-saving remediation, and litigation support.

24x7 Incident Response

Data Recovery Forensic Analysis

Evidence handling with sound methodology, recovery tools and processes supported by case law.

Data Recovery Forensic Analysis