Supplier Information Security Policy
Supplier Information Security Policy
Version 8.0
This document has been prepared using the following ISO27001:2013 standard controls
as reference:
ISO Control Description
A.15 Supplier Relationships
A.18 Compliance
1. Introduction
2. Purpose
As a data controller, the Council is responsible for complying with the GDPR
and must be able to demonstrate compliance with the data protection
principles. This will include taking appropriate technical and organisational
In the majority of instances, the relationships between the Council and its third
party suppliers are ultimately governed by a contract or information sharing
agreement, which is entered into between the Council and the third party
supplier.
3. Scope
4. Policy Statement
The Council uses a risk based and proportionate approach to how information
assets should be protected. Having procurement processes which align with
identified information asset risks helps to ensure that services and IT solutions
are procured, which are able to provide the level and quality of information
security required by the Council and are compliant with current data protection
legislation. To assess the level of risk, all projects which involve the collection,
Where the contract requires the processing of high risk or large volumes of
special categories of personal data (as defined within the DPA) consideration
should be given to the supplier being accredited against the Cyber Essentials
‘Plus’ certification. The exemptions applied by the Council are detailed below:-
The Council’s Financial Regulations (2019) require that “The Chief Financial
Officer is responsible for the operation of the Council’s accounting systems,
the form of accounts and the supporting financial records. Any proposed
changes by Strategic Directors to existing financial and/or control systems or
the establishment of new systems must be reported to and considered by the
Assistant Director of Finance (Audit) who will consider the potential impact on
the Internal Control framework and report to the Chief Financial Officer,
raising any concerns as appropriate. The Chief Financial Officer will then
formally consider the proposed changes. No changes may be actioned
without the formal approval of the Chief Financial Officer.”
The objective of the site visit(s) will be to assess the adequacy of the physical,
logical and operational controls in place and assess whether the supplier’s
approved IT security and data protection procedures are embedded within day
to day operations. Where applicable, a review of the IT system’s control
framework may also be undertaken, prior to being installed by the Council.
At the conclusion of the Audit due diligence the data protection and
information security issues will be communicated to the third party supplier for
comment. At this point the supplier has the opportunity to provide a response
on the issues that have been identified and include an appropriate actions
regarding how the control/ weakness will be addressed (including a timeframe
for correction). In the event that the supplier’s response is satisfactory, with an
appropriate timeframe for the correction of the identified issues, the Director of
Finance & ICT will be provided with an Audit report detailing the associated
findings for consideration. Details of the information security issues and
supplier’s response will be included within the Council’s contract to enable the
implementation of agreed information security controls to be monitored. A
flowchart outlining the key steps is included at Appendix C.
5.3 Contracts
All Council contracts shall clearly define each party’s data protection and
information security responsibilities toward the other by detailing the parties to
the contract, effective date, functions or services being provided (e.g. defined
service levels), liabilities, limitations on use of sub-contractors and other
commercial/legal matters normal to any contract. Depending on the
classification of the data, various additional information security controls may
be incorporated within the contract in addition to those set out either in
Appendix A or B dependent upon the nature of the service provision. The
DPA includes details on the Council’s obligations in terms of contractual
requirements with data processors:
During the period of the contract or relationship term, the Council will manage
the arrangement with its third party suppliers to ensure data protection and
Information Security standards are maintained. Where Audit Services have
undertaken an information security review, which resulted in
recommendations being made to the supplier, the implementation of these,
should be monitored during contract review meetings.
6.1 Sub-Contracting
The Council will include appropriate contractual obligations to ensure that any
sub-contractor engaged by a third party supplier is required to operate to the
same data protection and Information Security standards as the primary
contractor. Where there is a change in the delivery of a contract with the main
contractor seeking to sub-contract all or part of the Council’s contract this
must be formally approved by the Council prior to any changes.
The Council will allow third party suppliers to access its information and data,
where formal contracts and data sharing agreements exist in accordance with
current data protection legislation, the Council’s ISMS and where:
Viewing (i.e. access not agreed by the Council) of Council information is not
permitted at any time by third party suppliers. Council information must not be
accessed under any circumstances unless formal information sharing
agreements or written contractual permissions have been established
between the parties which permit this to happen.
The Council is very clear that where there is a requirement for the processing
of personal data of employees or service users by third parties, information
must be treated in accordance with the Council’s data protection obligations
and requirements to ensure the confidentiality, integrity and availability of all
information.
Under the DPA, the Council and its third party suppliers have a duty, to report
certain types of data breach to the Information Commissioner’s Office. A
personal data breach means a breach of security leading to the destruction,
loss, alteration, unauthorised disclosure of, or access to, personal data.
In such instances and following consideration of the available facts, the Director
of Finance & ICT will make a decision regarding whether the requirements of
the Policy are suspended until the Information Governance Group have the
opportunity to review its impact.
The Council’s information security and data protection requirements for potential third parties and suppliers are split over four distinct areas:
Part One – Independent Information Security Certification (To be completed by all Suppliers)
Unless able to apply an exemption, Council contracts for major IT solutions and/or contracts that involve the processing and/or retention of high volume of personal data,
will include a requirement for the supplier to be certified under the government-backed Cyber Essentials scheme. Where the contract requires the processing of special
categories of personal data, as defined within the DPA, consideration should be given to the supplier being accredited to the Cyber Essentials Plus certification. Suppliers
will be expected to be compliant with this requirement either prior to the contract award date or during the initial stages of the contract start date.
Ref. Expected Control – Cyber Essentials Restricted Data Controlled Data Public Data
1.1 Where deemed necessary, the supplier holds a current ‘Cyber Essentials Plus’ certification (or equivalent) X X
1.2 The supplier holds a current ‘Cyber Essentials’ certification (or equivalent) X X
Support and Guidance provided by Audit Services Support and Guidance provided by the Information Security/Governance Team
Part Two – Core Data Protection and Information Security Questions (To be completed by all Suppliers)
The table below, sets out the minimum data protection and information security controls for IT solutions or services where there is a requirement for the storing, handling,
processing or retention of the Council’s personal and/or business confidential data by third parties (including suppliers, contractors, sub-contractors and employees). The
expected controls aim to protect the Council’s interests by providing a flexible approach to managing data protection and information security risks during contractual
arrangements. Where there is a requirement to remove an expected control from an individual procurement this must be documented as part of the procurement planning
and management process.
Ref. Expected Control – Staff Related Restricted Data Controlled Data Public Data
2.1 Do you have written contracts of employment for your staff, which include reference to your information
X
security policies and procedures?
2.2 Do you provide all of your staff, volunteers and agency workers with a formal induction that includes
X
information security and data protection guidance?
2.3 Are your staff, volunteers and agency workers provided with annual training/ updates on information security
X
and data protection?
Ref. Expected Control – Policies Restricted Data Controlled Data Public Data
2.4 Do you have information security policies in place which your staff, volunteers and agency workers are
required to comply with?
2.5 Do you have a Password Policy for your staff, volunteers and agency workers which requires all individuals
to have a unique account and password?
2.6 Does your Password Policy require your staff, volunteers and agency workers to have a password that is at
least twelve characters in length, include complexity requirements and are periodically changed?
2.7 Are staff, volunteers and agency workers trained not to disclose their password to anyone?
2.8 Do you have a Bring Your Own Device Policy which outlines your requirements in terms of staff, volunteers
and agency workers using personal equipment at work?
2.9 Are staff, volunteers and agency workers restricted from using personal equipment (i.e. laptops, phones,
USB devices) for business activities?
2.10 Do you restrict your staff, volunteers and agency workers from using personal email accounts or personal
X
cloud based storage as part of normal business activities?
2.11 Do you have a Homeworking Policy for all staff, volunteers and agency workers?
2.12 Have you undertaken a risk assessment in terms of information security and Homeworking arrangements?
Ref. Expected Control – User Permissions Restricted Data Controlled Data Public Data
2.13 Do you ensure that staff, volunteers and agency workers are only provided with the access to information,
files and documents required to undertake their role?
2.14 Do you periodically review (at least every six months) staff, volunteers and agency workers access
permissions to ensure they reflect their current roles?
2.15 Do you have a process in place to ensure that staff, volunteers and agency workers access to your
computers and IT network is removed promptly when leaving and that all assets including keys, computers X
and documents are returned?
Ref. Expected Control – Network Restricted Data Controlled Data Public Data
2.16 Do you have a firewall (or similar network device) installed on the boundary of your internal network?
2.17 Do you restrict the ability to install software on your IT equipment (i.e. laptops and PCs) to senior managers
or system administrators?
2.18 Is anti-virus and malware software installed and regularly updated on all of your IT equipment (i.e. servers,
computers and laptops)?
2.19 Are all your computers and devices hard drives protected by encryption (e.g. Windows Bitlocker)?
2.20 Do you ensure that where information is transmitted over the Internet the connections are secured by
encryption? (e.g. HTTPS/ TLS v1.2 as a minimum)
2.21 Do you have the ability to send and receive secure, encrypted emails when communicating/exchanging
X
restricted or confidential data with the Council?
2.22 Do you undertake an annual vulnerability scan of your internal network to highlight potential security issues? X X
2.23 Do you undertake an annual vulnerability scan of your external network to highlight potential security issues?
2.24 Do you retain audit logs from your Internet, server and IT network usage for at least 30 days?
2.25 Do you restrict staff from sending confidential or personal data via SMS, text or instant messaging services? X
2.26 Do you ensure that staff mobile devices including phones and iPads holding confidential or personal data are
X
secured by the use of a ‘PIN’
Ref. Expected Control – Patch Management Restricted Data Controlled Data Public Data
2.27 Do you apply security patches (e.g Microsoft Windows updates) to all software running on your computers
and network devices?
2.28 Has out of date software been removed from your computers and network devices (e.g Windows XP or
Windows 7)?
2.29 Do you apply vendor updates and application updates to your smart phones? X
Ref. Expected Control – Business Continuity Restricted Data Controlled Data Public Data
2.30 Do you have a Disaster Recovery and Business Continuity Plan in place for your organisation?
2.31 Do you periodically test (at least annually) your Disaster Recovery and Business Continuity Plan?
2.32 Do you regularly take backups of your IT systems and its data?
2.33 Are your backups protected by encryption and held in a separate location to the main data?
2.34 Do you have a process in place to ensure that information security incidents are identified promptly and
notified to the Council (where applicable)? X
Ref. Expected Control – Data Retention and Disposal Restricted Data Controlled Data Public Data
2.35 Do you have a Data Retention Policy which includes the automatic deletion (where appropriate) of
information where the retention period has been exceeded? X
2.36 Do you have a procedure in place to manage the retention period for email records and other records
including Microsoft Word and Excel records, PDF documents and photos?
2.37 Do you have a process in place for the secure disposal of old IT equipment including hard drives, which is
supported by certificates of disposal? X
Ref. Expected Control – Manual Records Restricted Data Controlled Data Public Data
2.38 Are all paper records containing the confidential or personal data held securely on-site or as part of off-site
X
storage facilities?
2.39 Do you have a process in place for the secure disposal of paper documents and sensitive information, which
X
is supported by an audit trail?
2.40 When transporting confidential or personal data by vehicle are staff aware of the requirement that all records
and IT equipment must be held securely when left unattended?
Ref. Expected Control – Legal Compliance Restricted Data Controlled Data Public Data
2.41 Do you have procedures in place to monitor compliance with the Data Protection Act 2018 and General Data
Protection Regulation?
2.42 Do you have procedures in place to monitor compliance with the Computer Misuse Act (1990)?
2.43 Do you have procedures in place to monitor compliance with the Privacy and Electronic Communications
Regulations (2019)?
Ref. Expected Control – Third Parties Restricted Data Controlled Data Public Data
2.44 Do you have contracts in place with all of your third party suppliers i.e. IT support or data hosting company?
2.45 Have you undertaken appropriate due diligence checks (including the review of information security
accreditations where appropriate i.e.– Cyber Essentials) on third party suppliers that have access to X
personal data i.e. IT support and CRM system providers?
Support and Guidance provided by Audit Services Support and Guidance provided by the Information Security/Governance Team
Part Three – Data Protection and Information Security Questions for Suppliers of IT Solutions or Services either Hosted on the Council’s Network or Externally
by the Supplier
In addition to the core data protection and information security questions in parts one and two, the table below sets out the additional requirements when dealing with contracts
or services that relate to the provision or use of IT systems or solutions:
• installed on the Council’s internal network; or
• hosted remotely by the supplier.
• Where there is a requirement to remove an expected control from an individual procurement this must be documented as part of the procurement planning and
management process
Ref. Expected Control – Access Restricted Data Controlled Data Public Data
3.1 Does the IT solution have a configurable password policy, which would allow the Council to:
• Configure a password history;
• Configure a maximum password age;
• Configure a minimum password age;
• Configure a minimum password length (minimum of 12 characters);
• Configure a account lockout threshold of invalid logon attempts
• Configure password complexity requirements of at least four of the following elements:
• Numeric – (0-9)
• Uppercase – (A-Z)
• Lowercase – (a-z)
• Special Characters (?,!, @, #, %, etc…)
• Spaces
3.2 Can the IT solution’s administrative accounts (i.e. change of the system administrator’s password) be
undertaken without updates to the software?
3.3 Does the IT solution have the ability to enable multi-factor (2FA/MFA) authentication that can be configurable
to apply to each login instance if required, and include support for other methods of User authentication for X
example, Active Directory, Single Sign-on use of an existing Federation Service etc.?
3.4 Do you have user guides and documentation to support the installation and use of the IT solution?
3.5 When installing new IT systems do you ensure ‘Live’ data is not be used in any test systems? X
3.6 Does the IT solution allow different user permissions to be assigned based on their role i.e. read only,
amend or full administration?
3.7 Do you have procedures to ensure that data transferred from the Council’s existing IT systems are
X
undertaken securely (i.e. use of encryption)
3.8 Does the IT solution have an extractable audit trail which records the activity of users and system
administrators including:-
Ref. Expected Control – Access Restricted Data Controlled Data Public Data
• Date and time of transaction;
• User ID and name of the individual undertaking the transaction;
• Details of the data before and after the transaction;
• Details of user ‘logins’, ‘logouts’ and failed user connections; and
• Details of the user’s device IP address making the connection
3.9 Is the IT solution subject to a periodic independent penetration test (i.e. annually) to highlight potential
security issues?
3.10 Does the IT Solution have a login banner that provides a warning to potential intruders that certain types of
activity is illegal and advises authorised users of their obligations relating to acceptable use of the system?
3.11 Are procedures in place to record access to the IT Solution for system maintenance and/or system
administration support, which include details of the activity undertaken?
3.12 Does the IT Solution include the provision of a Mobile App which has been developed to ensure personal
and/or business confidential data is protected using secure access/communication technologies and
regularly updated with security updates/patches?
X
(Question to be used if the provision of a mobile app forms part of the specification)
3.13 Is the location holding the IT solution and its data certified to the information security standard
ISO27001:2013 or equivalent? (Externally Hosted IT Solutions only) X
3.14 Does the IT solution and its data which is provided as a cloud service, comply with the UK Government’s
Cloud Security Principles and/or compliance with ISO/IEC 27017 Security controls for Cloud Services? X
3.15 Are procedures in place to enable the recovery of the IT solution and its data in the event of interruption to
normal operational service? (Externally Hosted IT Solutions only)
Support and Guidance provided by Audit Services Support and Guidance provided by the Information Security/Governance Team
Part Four – Data Protection and Information Security Questions for Suppliers utilising a Third Party and/or Cloud based IT System or Solution in the Delivery of
the Contract
In addition to the core data protection and information security questions in parts one and two, the table below sets out the additional requirements when dealing with
contracts or services where the supplier will be utilising a third party/cloud based IT systems or solutions in the delivery of the service/contract:
• that are cloud based or
• hosted by a third party
Where there is a requirement to remove an expected control from an individual procurement this must be documented as part of the procurement planning and management
process.
Ref. Expected Control – Access Restricted Data Controlled Data Public Data
4.1 Do you have a contract in place with the supplier of the IT solution to use the software as part of the
Council’s contract?
4.2 Does the IT solution have a configurable password policy, which allows you to:
• Configure a password history;
• Configure a maximum password age;
• Configure a minimum password age;
• Configure a minimum password length (minimum of 12 characters);
• Configure a account lockout threshold of invalid logon attempts
• Configure password complexity requirements of at least four of the following elements:
• Numeric – (0-9)
• Uppercase – (A-Z)
• Lowercase – (a-z)
• Special Characters (?,!, @, #, %, etc…)
• Spaces
4.3 Do you use multi-factor (2FA/MFA) authentication to access the system in the event that you hold special
X
categories of data i.e. health records, safeguarding?
4.4 Do you have user guides and documentation to support the use of the IT solution?
4.5 Does the IT solution allow different user permissions to be assigned based on their role i.e. read only,
amend or full administration?
4.6 Does the IT solution have an extractable audit trail which records the activity of users and system
administrators including:-
• Date and time of transaction;
• User ID and name of the individual undertaking the transaction;
• Details of the data before and after the transaction;
• Details of user ‘logins’, ‘logouts’ and failed user connections; and
• Details of the user’s device IP address making the connection.
4.7 Is the IT solution subject to a periodic independent penetration test (i.e. annually) to highlight potential
X
security issues?
4.8 Does the IT Solution have a login banner that provides a warning to potential intruders that certain types of
activity is illegal and advises authorized users of their obligations relating to acceptable use of the system?
4.9 Is the location holding the IT solution and its data certified to the information security standard
ISO27001:2013 or equivalent? X
4.10 Does the IT solution and its data which is provided as a cloud service, comply with the UK Government’s
Cloud Security Principles, including compliance with ISO/IEC 27017 Security controls for Cloud Services? X
4.11 Are procedures in place to enable the recovery of the IT solution and its data in the event of interruption to
normal operational service?
Support and Guidance provided by Audit Services Support and Guidance provided by the Information Security/Governance Team
Additional guidance or clarification on the requirements within Appendix A can be obtained from the Council’s Information Security/Governance Team using the following
contact details:
Telephone: (01629) 538984 Email: [email protected]
BACKGROUND
Individuals, organisations and the voluntary sector are integral in assisting the Council to deliver a variety of essential services
across Derbyshire. To provide a number of these services, the Council is required to provide access to personal data in respect of
the individuals to whom services will be provided. As a responsible organisation, the Council is required by law, to take reasonable
steps to ensure that personal data covered by DPA is protected against unauthorised access or loss. With this in mind, the Council
has produced a checklist of the basic data protection and information security standards that are required where the storing,
handling, processing and/ or retention of personal data are incidental to the service being provided.
3.1 Laptops, USB devices, iPads etc holding the Council’s confidential or personal data must be locked away at the
Yes/ No
end of each working day.
3.2 Anti-virus software must be installed on IT equipment holding the Council’s confidential or personal data with the
Yes/ No
automatic update activated.
3.3 Software used on laptops, PCs, and mobile devices should be updated regularly. Yes/ No
3.4 Mobile devices including phones and iPads holding the Council’s confidential or personal data must be secured
Yes/ No
by the use of a ‘PIN’.
3.5 Where possible, PCs and laptops holding the Council’s confidential or personal data should be encrypted. Yes/ No
3.6 Old laptops, USB devices, iPads, smartphones etc used to hold the Council’s confidential or personal data must
Yes/ No
be disposed of securely to ensure that the data on the hard drives is destroyed.
3.7 Individuals with access to the Council’s confidential or personal data must take all reasonable steps to ensure
Yes/ No
that the information is not accidentally or intentionally disclosed.
3.8 The Council’s confidential or personal data should not be saved onto personal devices that do not belong to the
Yes/ No
organisation
4. Staff
4.1 All staff, volunteers and agency workers should be aware of their data protection responsibilities when dealing
Yes/ No
with the Council’s confidential or personal data?
4.2 All staff, volunteers and agency workers should be provided with an induction that includes information security
Yes/ No
and data protection guidance.
4.3 All staff, volunteers and agency workers should be provided with an annual update on the organisation’s data
Yes/ No
protection and information security procedures.
5. Business Continuity
5.1 A list of key tasks and contacts should be maintained in the event of a disruption to the operation of the
Yes/ No
organisation and its services.
Additional guidance or clarification on the requirements within Appendix B can be obtained from the Council’s Information
Security/Governance Team using the following contact details:
Telephone: (01629) 538984 Email: [email protected]