Watch this video on YouTube
When assessing due care in managing external service providers, which action should an information security manager prioritize to ensure long-term compliance?