Schedule Demo
Signup

Supplier Security and Acceptable Use Policy

DigitalXC works closely with system integrators and resellers to deliver services to its customers. As part of these engagement’s suppliers could potentially have access to DigitalXC information assets and platforms. However, recent information security breaches have shown that sometimes a third-party supplier can represent a significant weakness in the defences of our information assets. 

The objective of this Supplier Security Policy (“Supplier Security Policy”) is to ensure the protection of the organization’s assets that are accessible by suppliers and to identify & minimize the risk from suppliers and vendors.  It is very important therefore that our relationships with suppliers are based on a clear understanding of our expectations and requirements in the area of information security. These requirements must be documented and agreed in a way that leaves no doubt about the importance we place on the maintenance of effective controls to reduce risk. 

Refer the Controller – Processor agreement policy for controls related to suppliers acting as controller or processor or both. 

The following documents are relevant to this policy: 

The purpose of this document is to set out the organization’s information security policy in the area of supplier relationships. 

Scope 

Selecting the suppliers should be done with due diligence and that the ongoing monitoring and review of the service supplied is performed in an effective way. This Supplier Security Policy is applicable to all suppliers and vendors of DigitalXC.  

Responsibility 

Reference 

Information Security Management based on HITRUST CSF requirement. 

Policy Statement   

DigitalXC shall identify and mandate information security controls to specifically address supplier risks to its information assets. 

Policy Considerations 

General Provisions 

In general, information security requirements will vary according to the type of contractual relationship that exists with each supplier and the services delivered.  

However, the following will generally apply. 

The selection of required controls must be based upon a comprehensive risk assessment taken into account information security requirements, the service to be provided, its criticality to the organization and the capabilities of the supplier. 

Acceptable use for suppliers and supplier personnel  

Ethical or Legal Activities  

DigitalXC resources must be used for ethical and legal activities only but not for unethical or illegal activities which include, but are not limited to: 

Unacceptable activities  

The following activities are, in general, prohibited, unless specifically allowed during the course of legitimate job responsibilities (e.g., systems administration staff may be required to disable the network access of a host if that host is disrupting services). 

The list below is by no means exhaustive but attempts to provide a framework for activities, which fall into the category of unacceptable use. 

General System Activities 

System and Network Activities 

Communications Activities 

Blogging and Social Media 

Prohibited Uses of the Internet 

Except where it is strictly and necessarily required for your work, for example, IT audit activity or other investigation, you must not use the Internet access provided by DigitalXC to: 

Cloud services 

DigitalXC clearly recognize the risks associated with the cloud systems, so the access to and management of DigitalXC cloud data may be managed appropriately.  DigitalXC information security policy must be implemented as part of the agreement. DigitalXC will also ensure that information security objectives are set for third parties who provide components of the cloud service to customers and that they carry out adequate risk assessment in order to achieve an acceptable level of security. 

Due diligence 

Before contracting with a supplier, it is incumbent upon DigitalXC to exercise due diligence in reaching as full an understanding as possible of the information security approach and controls the company has in place. It is important that the documented Supplier Due Diligence Assessment Procedure is followed so that all the required information is collected, and an informed assessment can be made. 

This is particularly important where cloud computing services are involved, as legal considerations regarding the location and storage of personal data must be considered. 

Addressing security within supplier agreements 

Once a potential supplier has been positively assessed with due diligence the information security requirements of DigitalXC must be reflected within the written contractual agreement entered into. This agreement must take into account the classification of any information that is to be processed by the supplier (including any required mapping between DigitalXC classifications and those in use within the supplier), legal and regulatory requirements and any additional information security controls that are required. 

For cloud service contracts, information security roles and responsibilities must be clearly defined in areas such as backups, incident management, vulnerability assessment and cryptographic controls. 

A template DigitalXC Supplier Information Security Agreement may be used as a starting point. 

Appropriate legal advice must be obtained to ensure that contractual documentation is valid within the country or countries in which it is to be applied. 

Evaluation of existing suppliers 

For those suppliers that were not subject to an information security due diligence assessment prior to an agreement being made, an evaluation process must be undertaken in order to identify any required improvements.  

For details of this process see Supplier Information Security Evaluation Process.

Monitoring and Review of Service Delivery 

A process must be developed to monitor and assess the service delivery of a supplier to ensure it is meeting appropriate business and security requirements, as well as meeting any contract or SLA requirements. Each supplier will have a designated contract manager within DigitalXC who is responsible for arranging, chairing, and documenting the meetings.  

The performance of strategic suppliers will be monitored on a regular basis in line with the recommended meeting frequency. This will take the form of a combination of supplier-provided reports against the contract and internally produced reports. 

Contract Administration KPIs 

Performance Administration KPIs 

Where possible, a frequent cross-check will be made between the supplier reports and those created internally to make sure the two present a consistent picture of supplier performance. Both sets of reports will be reviewed at supplier meetings and any required actions agreed. 

Managing changes to supplier services 

Changes within contract 

Changes to services provided by suppliers will be subject to the DigitalXC change management process. This process includes the requirement to assess any information security implications of changes so that the effectiveness of controls is maintained. 

Contractual Disputes 

In the event of a contractual dispute, the following initial guidelines must be followed: 

At all times, the degree of risk to the business must be managed and if possible minimized. 

End of contract 

The following process will be followed for scheduled end of contract, early end of contract or transfer of contract to another party: 

The various aspects of ending a contract must be carefully considered at initial contract negotiation time. 

Monitoring 

CISO will review this Supplier Security Policy annually.  

Enforcement 

All supplier personnel (permanent, temporary and contract) shall acknowledge the Information Security Policy on a yearly basis; on the need for information security and protecting the information that they normally handle. For third parties working within DigitalXC, the corresponding Project Manager is to ensure that such third parties understand DigitalXC Information Security Policy. 

Enforcement of this Supplier Security Policy is mandatory & violations of this Supplier Security Policy shall be reported through the Security Incident Response Team (SIRT) procedure.  

The action taken after a violation is encountered is as follows: 

Any further violation of this Supplier Security Policy by the same person should result in strict disciplinary action that may extend up to termination of employment. 

    Request a Demo

    logo
    Digtal Service Cloud Sign up
    logo
    Request a Service Catalog