RETIRED CONTENTPlease note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.
Third parties often have the ability to modify systems, reset alarm thresholds, monitor hardware errors and performance, tweak operating systems and software, and remotely view, copy, and modify data and audit logs. The larger your company, the more challenging it is to manage these processes. Use Info-Tech's third-party access request form template to help you keep track of who has access to your valuable resources.