Chapter 6
CHECKLIST
Service Levels
□ Uptime
□ Response time
□ Problem response and resolution
□ Remedies
Data Security
□ Protection against security vulnerabilities
□ Disaster recovery and business continuity requirements
□ Frequency of data backups
□ Use of/return of data
□ Format for return of data
□ Review of security policies
□ Physical site visit
□ SSAE 18
□ Limitations on right to use data
Insurance
□ Cyber liability policy
□ Technology errors and omissions
□ Electronic and computer crime
□ Unauthorized computer access
□ Avoid only general liability policy
Indemnification
□ For breach of confidentiality and security requirements
□ For infringement claims
□ No limitation on types of IP covered
□ Consider ...
Get A Guide to IT Contracting, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.