ABSTRACT

Outsourcing information technology (IT) jobs has benefi ts if properly managed and conducted in a manner that doesn’t jeopardize the loss of strategic or corporate assets. Unfortunately, the common practice is to solely focus on reducing costs and not applying the same amount of attention or diligence in addressing security issues. Th is problem encompasses ethical issues, losses in revenue in the long run, and a clear and present danger to our national interests. If we as

Contents Background ..............................................................................................................................194 Today’s Business Environment (Globalization) .........................................................................195 Outsourcing Types ...................................................................................................................196 Risk Management ....................................................................................................................197 Intellectual Property .................................................................................................................197 Data Security/Protection ..........................................................................................................198 Turnover of Personnel ..............................................................................................................199 Insider Th reats ..........................................................................................................................199 Espionage Cases ...................................................................................................................... 200 Th e Business Case and Expected Cost Savings ......................................................................... 202 Business Impact ....................................................................................................................... 202 Ethics ...................................................................................................................................... 203 National Interest (United States and Others) ........................................................................... 204 Mitigations of Risks (Outsourcing) ......................................................................................... 205

Trusted Foundry ................................................................................................................. 205 Trusted Software ................................................................................................................. 205

Conclusion .............................................................................................................................. 206 About the Author .................................................................................................................... 206 References ............................................................................................................................... 206

that support a nation so dependent on technology?