In this tool, we identify seven criteria for evaluating vendors to produce marketing programs with sensitive data, including:
Third-party security audits & compliances require
Information security best practices to look for
Physical security standards potential vendors should follow