| Text of Recommendation | Include the Chief Information Security Officer or other technically qualified IT personnel
in the procurement process to determine how the third-party providers grant FEC
employees’ access to their systems and determine how these systems may affect FEC
operations. |
|---|---|
| Recommendation Number | 3 |
| Recommendation Status | Closed |
| Significant Recommendation | No |
| Recommendation Questioned Costs | $0 |
| Recommendation Funds for Better Use | $0 |
| Submitting OIG | |
|---|---|
| Linked Report |
