No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Compliance

Greatest Compliance Risks Surrounding Third-Party Outsourcing

by Robert J. Scott
January 29, 2014
in Compliance
Greatest Compliance Risks Surrounding Third-Party Outsourcing

Organizations have varied reasons for outsourcing information technology functions to third-party service providers (“Providers”). Companies that outsource (“Outsourcers”) may do so to reduce operational cost or for subject matter expertise. Unfortunately, significant risks associated with outsourcing important technology functions to Providers are being ignored.  These risks include business continuity, information security and data privacy, intellectual property and un-transferred litigation risks.  At the broadest level, lack of oversight and management controls create the majority of the risks associated with outsourcing.  All of these risks implicate the broader topic of compliance, and when key functions are outsourced, it becomes increasingly difficult to manage risk and monitor compliance.

Regulations and Standards

Examples of regulations IT organizations are working to comply with include the Gramm Leach Bliley Act (GLBA), the Health Insurance Portability and Accountability Act (HIPAA), Foreign Corrupt Practices Act and the Sarbanes-Oxley Act.  Rules are enacted by, among others, the FDIC, FTC, DOJ and most state legislatures.  Virtually all of these regulations create broad requirements concerning technology governance, which in turn impacts an organization’s outsourcing decisions.  In addition to statutory and regulatory compliance, Outsourcers face the risk of consumer class-action litigation based upon theories of negligence or unfair competition.  Regulatory organizations such as the Federal Financial Institutions Examination Council (FFIEC), National Institute of Standards and Technology (NIST), the Payment Card Industry Data Security Standard (PCI DSS) and the Cloud Security Alliance (CSA) generally provide standards and guidelines for handling data, security and information governance.  Although these organizations and associations are not regulators imposing mandated duties, following their guidelines and “best practices” shows a deeper commitment to diligence in calculating the risks involved in a certain outsourced transaction that is being contemplated or managed.  Additionally, following these guidelines (or requiring the provider by contract to comply) may go far in defending a claim by showing that the entity’s outsourcing conduct was reasonable.

Continuity

While business continuity may often be viewed only as a concept for creating sustainable and reproducible business transactions, it is a key component of many compliance obligations, especially in heavily regulated industries such as health care and financial services. When outsourcing technology functions, an organization may lose needed visibility into the organization’s ability to recover from a disaster. Outsourcers are often sold on the concept that the service provider is providing a turn-key solution, so it is common for businesses to assume that the Provider is taking care of all aspects of the outsourced service, including disaster recovery.  While the Provider’s liability is likely limited to damages arising out of the outsourcing agreement, the Outsourcer remains exposed to regulatory liability arising from its failure to comply with regulations, regardless of fault or knowledge. This non-delegable duty is the legal foundation for virtually all outsourcing risks.

Security and Privacy

The area of information security and data privacy is garnering significant attention, and not surprisingly, it presents a major risk when outsourcing technology functions.  As an example, a financial institution regulated by the GLBA is affirmatively required to:

  1. Exercise appropriate due diligence in selecting its service providers
  2. Require its service providers by contract to implement appropriate measures designed to meet the objectives of these guidelines and
  3. Where indicated by the bank’s risk assessment, monitor its service providers to confirm that they have satisfied their obligations as required by paragraph D.2. As part of this monitoring, a bank should review audits, summaries of test results, or other equivalent evaluations of its service providers.  See Appendix D-2 to 12 CFR Part 208, Section III.D.

When a process is outsourced, it may become more difficult to monitor and manage.  Additionally, almost every state has its own data breach and identity theft protection statutes for residents residing within that particular state.  If an entity does business with a resident of a particular state and there is a breach of security or unauthorized access to the resident’s non-public personally identifiable information, the entity must notify the resident as required by statute.  After functions are outsourced, events giving rise to notice obligations may become more difficult to discover.  With many regulated businesses, the handling of non-public personally identifiable information (PII) carries an increasingly burdensome compliance concern.  PII hosted in the cloud or exported outside the United States may offend regulatory rules.  Often once the Outsourcer contracts with the Provider, control of the data has been turned over and may become more difficult to track and protect.

Intellectual Property Rights

Intellectual property protection is another important risk area when outsourcing.  While protecting the Outsourcer’s own intellectual property rights is important, the greater risk comes from failure to protect the intellectual property of others.  Industry associations such as the Business Software Alliance or Software & Information Industry Association, which represent major software publishers, conduct audits of companies worldwide to ensure the intellectual property rights of their members are protected. Violations concerning copyright can be extremely costly, and while penalties rarely involve incarceration, prison time is possible. One example of copyright infringement risk occurs when  application support is outsourced.  Providers may have access to install software applications involving the copyrights of third-party software publishers.  They may install software without the appropriate licenses, creating the possibility of an infringement action against the Outsourcer that may not have any knowledge of the offending activities.  Because copyright infringement requires no intent to infringe, the Outsourcer can still be held liable for the infringement activities of the Provider.  It is important to utilize risk mitigation strategies when outsourcing projects or functions that even tangentially involve intellectual property rights.

Legal Liability

Un-transferred legal risk is another area of concern when outsourcing.  Virtually all outsourcing transactions involve written agreements that contain risk-balancing and risk-shifting provisions.  These agreements may involve difficult technical concepts, including emerging computer technologies, social networking, or complex health sciences topics.  As the law changes to keep pace with these constantly changing topics, it is difficult to keep up with trends concerning the contracts that govern the relationship between the Outsourcer and Provider.  The boiler plate language that one party may have used a few years ago may fail to address newer and more relevant topics.  Examples of this include new contract language concerning data breach incident response, loss of electronic trade secret information or the handling of PII.    Contract provisions that deal with insurance and indemnity involve the transfer of legal risk, and it is important that the Outsourcer be diligent in transferring as much legal risk as it can during the negotiation phase.

It is also risky when companies fail to adequately manage existing outsourcing contracts.  Many outsourcing agreements have some type of automatic renewal unless one party informs the other party of its intent not to renew within some agreed-upon notice period.  If the Outsourcer does not diligently maintain controls in the management of its vendors, it may miss an important renewal notice deadline and thus, an opportunity to renegotiate a contract when it has a better bargaining position.

Mitigation Strategies and Conclusion

Once risks are identified, many Outsourcers ask:  What can be done to mitigate the risk?  Broadly speaking, the greatest mitigation strategies require the implementation of stronger controls and oversight.  An entity must be committed to creating a culture of compliance internally and require the same of their Providers.  Additional risk mitigation strategies include the following:

  1. Carefully investigating prospective Providers, and when appropriate, ensuring they follow all appropriate industry standards;
  2. Using experienced technology attorneys for drafting and negotiating outsourcing contracts;
  3. Requiring Providers to comply with all applicable regulations and policies;
  4. Requiring Providers to carry applicable professional liability insurance, including endorsements for technology errors and omissions, network security and data privacy;
  5. Requiring Providers to include service level agreements and to document and test business continuity preparedness;
  6. Requiring Providers to include provisions for protection of intellectual property rights and related indemnification;
  7. Routinely auditing vendor compliance with contractual obligations and
  8. Upgrading terms and conditions during contract renewal periods.

Regardless of the reasons why a company may consider outsourcing technology functions, the decision presents significant risks.  Outsourcing decisions should not be made lightly, and if an entity decides to move forward, a great deal of diligence is required when selecting, contracting and managing Providers.


Tags: Board Risk Oversight
Previous Post

LRN118 – Thinking Critically About Risk

Next Post

Latin America’s Top FCPA Stories of 2013

Robert J. Scott

Robert J. Scott

About the Author Robert J. Scott represents mid-market and large enterprise companies in software license transactions and disputes with major software publishers such as Adobe, IBM, Microsoft, Oracle and SAP. He has defended over 225 software audit matters initiated by software piracy trade groups such as the BSA and SIIA. He is counsel to some of the world's largest corporations, such as Schlumberger, PepsiCo, Iron Mountain and American Express, on information technology matters including intellectual property licensing, risk management, data privacy, and outsourcing. Robert ensures that Scott & Scott, LLP continues its focus on cost-effective strategies that deliver positive results. He is regularly called upon by his peers and the media to share his expertise. He writes and speaks nationally on software licensing compliance and audit defense, cloud computing, privacy and security and outsourcing. He is a frequent CLE presenter. To see a partial list of his many presentations, published articles, and media appearances, visit http://www.scottandscottllp.com/main/robert_scott.aspx. Robert received his undergraduate degree from Austin College, Texas, and his J.D. from Hofstra University, and his Texas State Bar License in 1999. He is a Board Member of the Managed Service Providers Alliance, a Committee Member of State Bar of Texas Data Security and Privacy, and a Member of the Dallas Bar Association, Computer Law Section. He can be reached at rjscott@scottandscottllp.com or 214.999.0080.

Related Posts

kroger

Blocked, Sued and CEO-Less: How Kroger’s Board Must Navigate Triple Crisis

by Conor Johnston
June 9, 2025

Failed mergers often trigger talent exodus and shareholder fury, but strategic refocusing on core competencies can turn regulatory setbacks into...

signing deal signature

When the Ink Dries: 6 Critical Post-Transaction Areas That Make or Break M&A Success

by Jim DeLoach
April 14, 2025

Poor follow-up once the deal is closed can cause culture clashes & value erosion

news roundup new

Bang for the Buck: Regulators Pivot to Fewer But Higher-Value Enforcement Actions

by Staff and Wire Reports
April 11, 2025

CCI staff share recent surveys, reports and analysis on risk, compliance, governance, infosec and leadership issues. Share details of your...

merger concept figurines

When Money Isn’t Cheap, M&A Due Diligence Must Go Deeper

by Jim DeLoach
March 17, 2025

Today's dealmakers must scrutinize targets through multiple lenses to avoid costly post-acquisition surprises

Next Post
globe centered on latin america

Latin America’s Top FCPA Stories of 2013

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights