sig.org Open in urlscan Pro
23.23.83.160  Public Scan

Submitted URL: https://go.sig.org/e/918903/data-management-best-practices/qpjqr/252230041?h=CGIX1Xq_xzubICshKDbcw16VkCCKb1EEzhrJpd...
Effective URL: https://sig.org/peer2peer/data-management-best-practices
Submission: On February 01 via manual from IN — Scanned from DE

Form analysis 2 forms found in the DOM

POST /

<form action="/" method="post" id="search-api-page-search-form-sig-search" accept-charset="UTF-8">
  <div>
    <div class="container-inline">
      <h2 class="element-invisible">Search form</h2>
      <div class="form-item form-type-textfield form-item-search-block-form">
        <label class="element-invisible" for="edit-search-block-form--2">Search </label>
        <input title="Enter the terms you wish to search for." type="search" id="edit-keys-1" name="keys_1" value="" size="15" maxlength="128" class="form-text">
      </div>
      <div class="form-actions form-wrapper" id="edit-actions"><input type="submit" id="edit-submit" name="op" value="Search" class="form-submit"></div><input type="hidden" name="form_build_id"
        value="form-ThgjQWEhML_aYcY3BZgB30_rbdNj63_eaHKHC7G7lnw">
      <input type="hidden" name="form_id" value="search_api_page_search_form_sig_search">
    </div>
  </div>
</form>

POST /peer2peer/data-management-best-practices

<form action="/peer2peer/data-management-best-practices" method="post" id="search-api-page-search-form-sig-search" accept-charset="UTF-8">
  <div>
    <div class="form-item form-type-textfield form-item-keys-1">
      <label class="element-invisible" for="edit-keys-1">Enter your keywords </label>
      <input placeholder="Enter your keywords" type="text" id="edit-keys-1" name="keys_1" value="" size="15" maxlength="128" class="form-text">
    </div>
    <input type="hidden" name="id" value="1">
    <input type="submit" id="edit-submit-1" name="op" value="Search" class="form-submit"><input type="hidden" name="form_build_id" value="form-YjSA1lER8NyuJqp1S2R1icOyb7fMJjN6gtWFpj0G2is">
    <input type="hidden" name="form_id" value="search_api_page_search_form_sig_search">
  </div>
</form>

Text Content

×
 * Membership »
   * Become a Member
   * Buy-Side Memberships
   * Sell-Side Memberships
   * Member Benefits
 * SIG University »
   * Request to Enroll
   * Certifications »
     * Sourcing
     * Supplier Management
     * Third-Party Risk Management
     * Intelligent Automation
   * Semester Options
   * Testimonials
   * Faculty & Advisers
   * Enrollment Fees
   * Certification Maintenance
   * Curriculum Guide
   * Free Trial
 * Events »
   * SIG Summits
   * SIGnature Events
   * CPO & Executive Virtual Series
   * Power Hour Webinars »
     * On-Demand Webinars
   * Future of Sourcing Awards
   * Event Calendar
 * Resources »
   * SIG Resource Center
   * Peer2Peer Forum
   * Research
   * SIG Speaks Blog
   * Future of Sourcing
   * Podcasts
   * Spotlight Content
   * Executive Videos
   * Press Releases
 * Career Network
 * About »
   * Leadership Team
   * Advisory Board
   * Providers & Advisors
   * Sponsors
   * Affinity Programs
   * Contact Us
 * Log In

Skip to navigation Skip to main content
 * Membership »
   * Become a Member
   * Buy-Side Memberships
   * Sell-Side Memberships
   * Member Benefits
 * SIG University »
   * Request to Enroll
   * Certifications »
     * Sourcing
     * Supplier Management
     * Third-Party Risk Management
     * Intelligent Automation
   * Semester Options
   * Testimonials
   * Faculty & Advisers
   * Enrollment Fees
   * Certification Maintenance
   * Curriculum Guide
   * Free Trial
 * Events »
   * SIG Summits
   * SIGnature Events
   * CPO & Executive Virtual Series
   * Power Hour Webinars »
     * On-Demand Webinars
   * Future of Sourcing Awards
   * Event Calendar
 * Resources »
   * SIG Resource Center
   * Peer2Peer Forum
   * Research
   * SIG Speaks Blog
   * Future of Sourcing
   * Podcasts
   * Spotlight Content
   * Executive Videos
   * Press Releases
 * Career Network
 * About »
   * Leadership Team
   * Advisory Board
   * Providers & Advisors
   * Sponsors
   * Affinity Programs
   * Contact Us
 * Log In

Navigate to... Membership »– Become a Member– Buy-Side Memberships– Sell-Side
Memberships– Member Benefits SIG University »– Request to Enroll– Certifications
»–– Sourcing–– Supplier Management–– Third-Party Risk Management–– Intelligent
Automation– Semester Options– Testimonials– Faculty & Advisers– Enrollment
Fees– Certification Maintenance– Curriculum Guide– Free Trial Events »– SIG
Summits– SIGnature Events– CPO & Executive Virtual Series– Power Hour Webinars
»–– On-Demand Webinars– Future of Sourcing Awards– Event Calendar Resources
»– SIG Resource Center– Peer2Peer Forum– Research– SIG Speaks Blog– Future of
Sourcing– Podcasts– Spotlight Content– Executive Videos– Press Releases Career
Network About »– Leadership Team– Advisory Board– Providers &
Advisors– Sponsors– Affinity Programs– Contact Us Log In


SEARCH FORM

Search

Enter your keywords

 * Peer-2-Peer
 * Analysis/Benchmarking
 * Category Specific
 * Governance & Compliance
 * Innovation
 * Management
 * Operations
 * Outsourcing
 * Sourcing
 * Sustainability
 * Talent/Labor

Peer2Peer >> Management


DATA MANAGEMENT BEST PRACTICES

 * Mary Zampino
 * January 04, 2023
 * 1386 view(s)

This member, from the insurance industry, is seeking best practices in how firms
manage the risks of data, particularly Non-Public Information (NPI), being
stored or processed outside of the United States.  

Please kindly take a moment and share your company's general practices regarding
the following.

1.Does your company enforce or regulate security policies and restrictions of
where company NPI data is stored/sent?

2.If yes, how do you enforce or regulate? Through audit? Notice requirements?
Please explain. 

3.If yes, who at the company is responsible for the audits or enforcement? And
in what department do they reside (e.g. procurement, technology, finance, etc.)?

4.If yes, what are the consequences your company imposes in case of violations?
Can you share any contract clauses related to liability/language used to support
enforcement and describe violations? 

 

The full content of this page is only available to SIG Members.

Log In


Interested in becoming a SIG Member?
Contact Us



FORUMS:

 * Management

 * 

 * Membership
 * SIG University
 * Events
 * Resources
 * Career Network
 * About
 * Log In


FOLLOW US






SUBSCRIBE TO UPDATES

And always stay informed of the latest SIG news and events!

sign up
© 2023 SIG - Sourcing Industry Group. Privacy Policy
Desktop Version Only

 

 











×
We Value Your Privacy
Settings
NextRoll, Inc. ("NextRoll") and our advertising partners use cookies and similar
technologies on this site and use personal data (e.g., your IP address). If you
consent, the cookies, device identifiers, or other information can be stored or
accessed on your device for the purposes described below. You can click "Allow
All" or "Decline All" or click Settings above to customize your consent.
NextRoll and our advertising partners process personal data to: ● Store and/or
access information on a device; ● Create a personalized content profile; ●
Select personalised content; ● Personalized ads, ad measurement and audience
insights; ● Product development. For some of the purposes above, our advertising
partners: ● Use precise geolocation data. Some of our partners rely on their
legitimate business interests to process personal data. View our advertising
partners if you wish to provide or deny consent for specific partners, review
the purposes each partner believes they have a legitimate interest for, and
object to such processing.
If you select Decline All, you will still be able to view content on this site
and you will still receive advertising, but the advertising will not be tailored
for you. You may change your setting whenever you see the Manage consent
preferences on this site.
Decline All
Allow All
Manage consent preferences