|Text of Recommendation|| |
Include the Chief Information Security Officer or other technically qualified IT personnel in the procurement process to determine how the third-party providers grant FEC employees’ access to their systems and determine how these systems may affect FEC operations.
|Recommendation Number|| |
|Recommendation Status|| |
|Significant Recommendation|| |
|Recommendation Questioned Costs|| |
|Recommendation Funds for Better Use|| |