Watch this video on YouTube
In a situation where the service level agreement (SLA) for an outsourced IT function does not provide adequate protection, what should an information security manager do?