The guide available to download below aims to:
- Raise awareness among IT decision-makers of the information system security risks associated with any outsourcing operation
- Provide a coherent approach to considering information system security aspects when drawing up specifications for an outsourcing operation
- Provide a set of model clauses and basic security requirements which can be adapted and tailored to suit the specific context of each outsourcing operation
The approach set out in this guide seeks to reduce the risks associated with outsourcing operations.