What are some of the key pitfalls of big data contracts and how can companies avoid them?
Vendor contracts are always a tough topic. You always want to protect yourself or your company, but you also don’t want to be so restrictive that the vendor feels handcuffed. Just like the agile method of developing, you want to have your vendor contract have the flexibility to allow for those frequent changes and pivots, without being a runaway cash train.
I also like to establish a way for major red flags with a project to be brought to the table and addressed in a group. It’s similar to a whistleblower clause. If anyone feels there is something dangerous or legally risky being done, they have a clear place to take the issue to be addressed and that group is responsible for its resolution and logging of the issue. This helps both sides mitigate that type of risk.
Finally, you want to make sure information management issues are addressed as tightly as possible. Since we do all B2B, we often don’t run into a lot of personal information, just business information. We do try to address the information management and security issues in many different ways to ensure data isn’t leaked, stolen or used for anything outside of our own analysis to make our services better.
More Q&As from our experts
- What are some key things to know about corporate data backup?
- How is data analytics being used in the telecom industry?
- How can data analytics help smaller companies compete with bigger competitors?
- Big Data
- Vendor Risk Management
- Agile Software Development
- Information Management
- Data Breach
- Database Column
- Data Modeling
Tech moves fast! Stay ahead of the curve with Techopedia!
Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.
- Robotic Process Automation: What You Need to Know
- Data Governance Is Everyone's Business
- Key Applications for AI in the Supply Chain
- Service Mesh for Mere Mortals - Free 100+ page eBook
- Do You Need a Head of Remote?
- Web Data Collection in 2022 - Everything you need to know
- How to Protect Microsoft 365 from NOBELIUM Hackers