8. Building Effective Security into Acquisitions
With the continued and growing dependence of the government on commercially provided IT services, what changes are needed to government acquisition policies and practices to ensure that contractors provide adequate security and privacy protections to government data and information?
Endorse existing ideas by voting for them. YOU MUST BE LOGGED ON TO VOTE.