Data privacy and cybersecurity services header

Vendor relationships

You need to be proactive with your policies, procedures and protocol when it comes to vendor relationships and outside collaboration - nearly one-third of all breaches are the result of an incident at a third-party vendor. To minimize risk and ensure compliance with applicable statutes, we work in collaboration with your internal and external IT vendors to assist and support your data privacy initiatives. Services include:
  • Written Information Security Program
  • Incident Response Plan
  • Training
  • Vendor agreements
  • Computer usage policies
  • Document retention protocols



Dan L. Makee profile image

Dan L. Makee

Timothy J. Lowe profile image

Timothy J. Lowe

Rachel H. Yaffe profile image

Rachel H. Yaffe

William J. O'Neill profile image

William J. O'Neill

Cody S. D. Wamsley profile image

Cody S. D. Wamsley

Richard H. Blake profile image

Richard H. Blake

Miriam L. Rosen profile image

Miriam L. Rosen

Raquel (Rocky) A. Rodriguez profile image

Raquel (Rocky) A. Rodriguez

Christine N. Czuprynski profile image

Christine N. Czuprynski

Dominic A. Paluzzi profile image

Dominic A. Paluzzi

Christopher B. Hopkins profile image

Christopher B. Hopkins

James J. Giszczak profile image

James J. Giszczak

Alan M. Burger profile image

Alan M. Burger

Rick L. Hindmand profile image

Rick L. Hindmand

Adam C. Smith profile image

Adam C. Smith

Samuel D. Goldstick profile image

Samuel D. Goldstick

David T. Movius profile image

David T. Movius

Matthew R. Rechner profile image

Matthew R. Rechner

Emily A. Johnson profile image

Emily A. Johnson

Sherri A. Krause profile image

Sherri A. Krause