address what steps a business leader should take to protect sensitive information handled and stored by third-party vendors.
assitant needed
please see attachment Description: In this module, students will design a program/intervention to address their selected problem. Programs/interventions may be long-term (several months), single-shot (short term, one day) seminars, awareness campaigns, and more. Students are not permitted to use existing, real programs in their totality, but are allowed to utilize