It’s not uncommon for organizations to provide business partners and vendors with access to IT systems and data. In some cases, a partner could be storing the other organization’s sensitive data. The assumption is that the third party will act responsibly, but that’s far from guaranteed.



