The issue of security and confidentiality of information and being exchanged across a network of issues that concern not only researchers and specialists, but also the involved international organizations and the whole world for the critical significance of information techniques in different fields of life domains in this present age. Informatics or information technology sector is selected for this study for being one of the greatest sectors of the state and the one of the most vital strategic sector. However, counting on informatics has its risks; one of these critical risks is the security and confidentiality of information that should be adopted by the supreme management for protecting assets and developing approaches and techniques necessary for confrontation of risks. This management's job is to make investment successful in information security and protection of assets inside a company or an institution, focusing also on motivating employees to become loyal to their labor place and identifying the strength and weakness points, opportunities of developing and improvement in terms of a hard severely competitive setting with huge companies and corporations; conserving at the same time the security and confidentiality of information inside and outside a corporation, non-disclosure of information for competitors and other stakeholders. The purpose of the research is to measure and interpret the impact of external outsourcing of IT functions on the security and confidentiality of information and the appropriateness and credibility of information by linking the provision of external outsourcing to IT functions, security and confidentiality of information, identification of weaknesses in the system, Security and confidentiality of information and procedures necessary to achieve them. Therefore, researchers have selected a sample of categories involved in informatics as the study population for their perception of the research problem nature. This sample includes engineers, technicians and other persons working in the field in various stages (training centers) or in other different institutions all over Egypt; in addition to (100) engineers of communication networks and technical support, programmers of database or information security. A questionnaire form is used in this study consisting of three axes: outsourcing of IT tasks, appropriateness of information, and credibility of information.
The field study results indicate the validity of the hypothesis that There is a correlation between the outsourcing of information technology and dependency and appropriateness of information. There is also a correlation between external outsourcing of IT tasks and credibility of information.
The corporations that depend in their work cycle path on information technique the policy of importing and securing services from outsourcing of the institution. Hence, institutions seek to reach cooperation agreements with outsourcing companies. These companies supply others with devices and programs of protection walls through which mechanic automatic updating is fulfilled, in addition to combating commercial mail, intrusion prevention, filtering the undesirable sites, and people in charge of managing protection devices are responsible for preparing and updating those devices which is fulfilled but not very perfectly.