Ensuring that activities performed by outsourcing providers comply with information security policies can BEST be accomplished through the use of:
A. service level agreements.
B. independent audits.
C. explicit contract language.
D. local regulations.
A. service level agreements.
B. independent audits.
C. explicit contract language.
D. local regulations.