Supplier Management

เหล๖สำฦต

Engaging Suppliers

เหล๖สำฦต suppliers play an important role in protecting เหล๖สำฦตโ€™s data and information assets. When selecting and working with suppliers, it is important for all เหล๖สำฦต organizations to manage cybersecurity risks related to suppliers. This page outlines some important responsibilities for all เหล๖สำฦต organizations.

Include all Relevant Agreements and Appendixes: Supplier contracting plans must include the appropriate agreements and appendices to ensure security, compliance, and privacy of เหล๖สำฦต data. The Business Procedures Manual, Section 3.4.4 applies when a supplier will or will be able to access, collect, process, or maintain เหล๖สำฦต data or other critical information. It is also applies when a supplier will or will be able to access and/or provide mission-critical IT Resources. Additionally, the IT Handbook and the Supplier Management: A เหล๖สำฦต IT Handbook Companion Guide addresses the technical requirements affecting both the เหล๖สำฦต and the suppliers under consideration.

Ensure Suppliers Meet Requirements: Select a supplier that meets compliance requirements, including security and privacy. Before executing a supplier contract, make sure the supplier clearly understands เหล๖สำฦต’s cybersecurity requirements and provides an acceptable plan for protecting เหล๖สำฦต data and information assets. Select a supplier by considering a broad range of functional and performance capacities, including the ability to protect เหล๖สำฦตโ€™s data and information assets and execute supplier responsibilities as defined within the เหล๖สำฦต Cybersecurity Standard. เหล๖สำฦต organizations must include cybersecurity planning in the entire supplier lifecycle. Consult your local cybersecurity professional or contact cybersecurity@usg.edu should you have questions.

Leverage Procurement Services: Procurement Services guides the supplier selection process by helping เหล๖สำฦต organizations follow the correct procurement and contracting process. For example, checklists have been provided to aid in the contracting process. Also provided are FAQs to address the most common questions. To learn more about เหล๖สำฦต contract language including data security and privacy terms and conditions, contract routing form example, and contract flow diagrams, please visit the (credentials required). If you have additional questions, please contact contracts@usg.edu.