About This Chapter
Partner & Vendor Security Management - Chapter Summary
Learning about partner and vendor security management is fun and easy using this chapter's entertaining lessons. Gain greater insight into a variety of topics, including the Foreign Corrupt Practices Act and third party security reviews in a short amount of time. Accompanying each lesson is a multiple-choice quiz designed to effectively gauge your knowledge of main concepts. We also offer a chapter exam to ensure you fully comprehend every lesson. To keep track of your progress through this chapter, be sure to stop by the Dashboard. You can also quickly send any lesson topic questions to our subject-matter experts. Once you've completed this chapter, you will be able to do the following:
- Define and share examples of information security agreements
- List and discuss data breach notification laws
- Summarize the Foreign Corrupt Practices Act
- List steps and discuss the purpose of third party security reviews
1. Information Security Agreements: Definition & Examples
An information security agreement is designed to protect the information assets of a company working with a third party. In this lesson, you'll learn more about these agreements, their importance and framework.
2. Data Breach Notification Laws
Data breaches cost organizations and individuals more than money. This lesson will provide an overview of data breach notification laws, which are intended to protect individuals in the event of stolen personal information.
3. What Is the Foreign Corrupt Practices Act? - Summary & Cases
This lesson covers the Foreign Corrupt Practices Act. In this lesson, we'll take a look at the definition of the Act and what happens when a company violates it. We'll also review some real life examples of violations.
4. Third Party Security Reviews: Steps, Purpose & Overview
A third-party security review helps protect a company in its dealings with its offsite vendors and suppliers. In this lesson, you'll learn more about these reviews, how they're conducted and what is necessary to demonstrate compliance.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 332: Cybersecurity Policies and Management course
- Intro to Cybersecurity
- The Cybersecurity Threat Landscape
- Information Security Policy
- Information Security Strategy Development
- Cybersecurity Policy, Governance & Management
- Cybersecurity Risk Management
- Data Access Control
- Security Awareness Training
- Information Security Compliance
- Information Security Performance Metrics
- Required Assignments for Computer Science 332