Today’s contract technologies help organizations create, maintain, and analyze the contents of their contracts on a scale that was unthinkable just a few years ago. But the digital transformation of those workflows creates new risks for security and privacy breaches.
This guide describes several types of security and privacy threats to contract data, and the state-of-the art practices, techniques, and technologies used to combat those threats. It also serves as a checklist when speaking with technology vendors about their protection of contract data so that buyers understand:
- Protections against security threats to a vendor’s systems in the form of unauthorized access and malware.
- Protections against the vulnerabilities of a vendor’s system to attacks that are directed at the vendor’s employees.
- Privacy protections focused on protecting data in the underlying documents, ensuring that sensitive data in contracts is not available to third parties, even when models trained on the data are shared with them.