top of page

SHADOW IT – Inclusion of Busch Data in All Technology Decisions

Effective Date: December 1, 2024

At Busch Data, your business's security is our top priority. As your trusted technology partner, we are dedicated to safeguarding your operations through comprehensive IT management and services tailored to your needs.

​

To enhance the protection of your company and maintain the integrity of our service agreements, we are implementing a new policy effective December 1, 2024. Busch Data must be included in all technology-related decisions, implementations, and planning sessions. Our involvement is essential for the following security-focused reasons:

​

  1. Threat Mitigation: Our involvement allows us to identify and address potential security vulnerabilities before they can be exploited, protecting your organization from cyber threats such as configuration errors, malware, ransomware, and phishing attacks.

  2. Compliance Assurance: We ensure all technology implementations adhere to industry regulations and standards, helping you avoid legal penalties and reputational damage associated with non-compliance.

  3. Secure Integration: Including us early ensures that new technologies are integrated securely with your existing systems, minimizing the risk of data breaches and unauthorized access.

  4. Data Protection: We implement robust data security measures to safeguard sensitive information and ensure your data assets' confidentiality, integrity, and availability.

​

Policy Details:​

​

  • Effective December 1, 2024, we require our involvement during the planning phase of all technology-related changes—without exception. This policy includes adopting Software as a Service (SaaS) solutions, cloud services, and third-party technology platforms. To ensure compliance, any analysis or integration of undisclosed technology changes presented after an agreement is signed or implemented without prior notification will incur a mandatory catch-up fee of 2.5 times our standard time and materials rate.

  • Please note that our promise to keep your organization safe depends on our full involvement in your technology decisions. This assurance is voided for all tech-related decisions outside our purview.

  • Regardless of job titles that may suggest technical expertise, employees must collaborate with Busch Data to ensure that all security protocols are properly implemented and maintained.

​

Our Commitment to Your Security​

We are committed to fortifying your organization's defense against ever-evolving cyber threats. By including us in your technology discussions, we can proactively address security concerns and ensure the resilience and reliability of your IT infrastructure. 

 

Closing:

We acknowledge that you are free to run your business as you see fit. However, please be aware that if you do not adhere to this policy, you may expose your business to significant cyber risks, incur additional costs due to our late involvement, and potentially face account closure with Busch Data.

Your cooperation is vital to maintaining a secure operational environment. Please feel free to contact us to discuss any upcoming projects or if you have questions about this policy.

bottom of page