Text of Recommendation | Include the Chief Information Security Officer or other technically qualified IT personnel
in the procurement process to determine how the third-party providers grant FEC
employees’ access to their systems and determine how these systems may affect FEC
operations. |
---|---|
Recommendation Number | 3 |
Recommendation Status | Closed |
Significant Recommendation | No |
Recommendation Questioned Costs | $0 |
Recommendation Funds for Better Use | $0 |
Submitting OIG | |
---|---|
Linked Report |