79
Used by
Chris Young
A static version of the document with guidance notes was uploaded.
Genie Team
Description updated
Chris Young
Minor updates to version table.
Chris Young
This policy is used to ensure the company's 3rd party suppliers (such as those providing technology software to the company) adhere to certain security standards as required by ISO27001 or SOC2 for instance. Everything after the Introduction can and should be copy and pasted into supplier legal agreements, or else the supplier agreements should reflect this policy. The company may not have such stringent requirements on suppliers processing non-critical data as defined by the company.