GV.SC-10.118

Has your organization implemented a formal supplier termination process that addresses data security and system access risks?

Explanation

When supplier relationships end, there are significant risks if access to systems and data isn't properly revoked, or if data transfer/destruction isn't managed securely. This question assesses whether your organization has formalized procedures to mitigate these risks during supplier offboarding. Evidence could include a documented supplier termination procedure that covers: system access revocation timelines, data return/destruction requirements, final security assessments, and contractual obligations enforcement. This might be part of your vendor management policy or a standalone process document with associated checklists.

Implementation Example

Mitigate risks to data and systems created by supplier termination

ID: GV.SC-10.118

Context

Function
GV: GOVERN
Category
GV.SC: Cybersecurity Supply Chain Risk Management
Sub-Category
Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron