What customers want from data recovery companies -- besides their data back

Survey asks IT personnel for criteria in vetting third parties that handle their data

The officers of DriveSavers had a suspicion that government agencies and other organizations rarely vetted third-party companies they contracted to recover lost data. Why? Because DriverSavers knew that agencies rarely vetted the data recovery company's people.

The company, along with the Ponemon Institute, conducted a survey of 636 information technology security and IT support personnel, and the results confirmed the company’s contention that a large number of security breaches are associated with third-party vendors, said Michael Hall, DriveSavers' chief information security officer.

The two companies presented the survey’s findings to the National Institute of Standards and Technology, which has prepared guidelines for improving the vetting process.

The survey also asked participants to develop criteria for vetting third-party data recovery vendors. The criteria include:

  • Proof of internal IT controls and data security safeguards, such as compliance with Statement on Auditing Standards 70 Type 2 auditing. Organizations "want to know that the company that they’re sending their information to can meet their compliance criteria,” Hall said.
  • Training and certification for data recovery engineers in all leading encryption software products and platforms. Hall said that is important for state and federal government organizations mandated to provide encryption on portable devices.
  • Proof of chain-of-custody documentation and a certified secure network. Potential customers wanted to know where their data was at all times, and they wanted to know that it was being stored on a secure network.
  • Vetting and background checks on all employees of the data recovery company.
  • Secure and permanent destruction of data when required.
  • Re-encryption of recovered information so that it cannot be compromised when it is returned.

Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.

Featured

  • SEC Chairman Jay Clayton

    SEC owns up to 2016 breach

    A key database of financial information was breached in 2016, possibly in support of insider trading, said the Securities and Exchange Commission.

  • Image from Shutterstock.com

    DOD looks to get aggressive about cloud adoption

    Defense leaders and Congress are looking to encourage more aggressive cloud policies and prod reluctant agencies to embrace experimentation and risk-taking.

  • Shutterstock / Pictofigo

    The next big thing in IT procurement

    Steve Kelman talks to the agencies that have embraced tech demos in their acquisition efforts -- and urges others in government to give it a try.

  • broken lock

    DHS bans Kaspersky from federal systems

    The Department of Homeland Security banned the Russian cybersecurity company Kaspersky Lab’s products from federal agencies in a new binding operational directive.

  • man planning layoffs

    USDA looks to cut CIOs as part of reorg

    The Department of Agriculture is looking to cut down on the number of agency CIOs in the name of efficiency and better communication across mission areas.

  • What's next for agency cyber efforts?

    Ninety days after the Trump administration's executive order, FCW sat down with agency cyber leaders to discuss what’s changing.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group