Will any data be transferred to the consultant's possession?
Explanation
Example Responses
Example Response 1
Yes, our consulting engagement will require transferring limited customer data to the consultant's systems for analysis Only de-identified transaction data will be transferred, with all PII removed before transfer Data will be transferred via our secure SFTP server with encryption in transit The consultant will store this data on encrypted systems that comply with our security requirements as specified in our consulting agreement All data will be securely destroyed within 30 days of project completion, with a certificate of destruction provided to our security team.
Example Response 2
No, our consulting arrangement is structured so that all data remains within our environment The consultants will access our systems through a secure VPN connection and temporary accounts with appropriate access controls They will perform all analysis within our environment using our tools, and no data will be extracted or transferred to their possession All consultant activity will be logged and monitored by our security operations team throughout the engagement.
Example Response 3
We have not yet determined the exact data handling requirements for this consulting engagement While we anticipate that consultants may need access to some operational metrics, we have not established whether this will require data transfer or if consultants can work within our environment This is a gap in our current planning that we need to address before finalizing the engagement We recognize this as a security risk and will develop appropriate controls once we determine the data access requirements.
Context
- Tab
- Case-Specific
- Category
- Consulting Services

