GV.SC-05.086
Has your organization established formal rules and protocols for information sharing with suppliers and sub-tier suppliers in your contractual agreements?
Explanation
This question assesses whether your organization has clearly defined how sensitive information should be shared with suppliers throughout your supply chain. Proper information sharing protocols help prevent unauthorized disclosure, ensure appropriate handling of confidential data, and establish clear expectations for all parties involved in the supply chain. These protocols typically include classification of shareable information, secure transmission methods, access controls, and incident reporting requirements. Evidence could include supplier agreement templates with information sharing clauses, data classification policies specific to supplier relationships, documented information exchange procedures, or supplier security requirements that outline information handling expectations.
Implementation Example
Define the rules and protocols for information sharing between the organization and its suppliers and sub-tier suppliers in agreements
ID: GV.SC-05.086
Context
- Function
- GV: GOVERN
- Category
- GV.SC: Cybersecurity Supply Chain Risk Management
- Sub-Category
- Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties

