When selecting a vendor, consider data privacy and cybersecurity risks right from the start. How much data will the vendor need to access? Can that be limited in any way? Does the vendor require ...
As states get ready for federal accessibility compliance, the National Association of State Chief Information Officers has released a step-by-step guide to ensure access is part of purchasing, too.
Whenever our agency is presented with a contract by a technology supplier other than a CRS vendor, the contract contains lots of clauses that are either indecipherable or written to protect the vendor ...
Onboarding a new Software as a Service (SaaS) vendor is no small task. While the right vendor can help streamline workflows, improve processes, and maximize efficiencies, evaluating potential partners ...
When it comes to major personal purchases (e.g. vehicles, televisions, appliances, etc.), I am not a spontaneous buyer. I shop around exhaustively — comparing product features, reviews, and prices — ...
Vendors are key to the success of almost every information technology consultant. Strong vendor relationships help good consultants excel, but a dysfunctional vendor alliance can sink even the most ...
This article can serve as a checklist for your next technology project and a reminder that spending time up front on the agreement between the parties can pay dividends later in the relationship for ...
Third party risk management process should be part of your overall cybersecurity program. Having the right processes in place will help you identify risk in your third parties and put a remediation ...
The truth is that hiring a great SEO company is becoming more and more difficult as Google continues to evolve, which unfortunately also means that hiring the right vendor is now more important than ...