vendor Policy
Vendor and Third-Party Risk Management Policy
Defines requirements for assessing, onboarding, monitoring, and offboarding third-party vendors who process or access Mesta data. Includes due diligence, contractual requirements, ongoing reviews, and vendor security assessments.
ActiveDownload PDF
Version
1.6.0
Effective Date
1/1/2025
Next Review
1/1/2026
Approved By
Chief Compliance Officer
Policy Document
Vendor and Third-Party Risk Management Policy
Version: 1.6.0 Effective Date: 2025-01-01 Next Review: 2026-01-01 Approved By: Chief Compliance Officer ---1. Purpose and Scope
Defines requirements for assessing, onboarding, monitoring, and offboarding third-party vendors who process or access Mesta data. Includes due diligence, contractual requirements, ongoing reviews, and vendor security assessments.
This policy applies to all Mesta Technologies Inc. employees, contractors, vendors, and systems that process, store, or transmit company or customer data.
2. Roles and Responsibilities
3. Policy Statements
[Detailed policy requirements would be listed here in the full document]
3.1 General Requirements
This section outlines the fundamental requirements that all stakeholders must follow.
3.2 Specific Controls
This section details specific technical and administrative controls implementing this policy.
3.3 Exceptions
Policy exceptions require written approval from Chief Compliance Officer and must be reviewed quarterly.
4. Enforcement
Violations of this policy may result in disciplinary action, up to and including termination of employment or contract, and may result in legal action.
5. Related Documents
This policy supports the following security controls:
3.2 Specific Controls
This section details specific technical and administrative controls implementing this policy.
3.3 Exceptions
Policy exceptions require written approval from Chief Compliance Officer and must be reviewed quarterly.
4. Enforcement
Violations of this policy may result in disciplinary action, up to and including termination of employment or contract, and may result in legal action.
5. Related Documents
This policy supports the following security controls:
4. Enforcement
Violations of this policy may result in disciplinary action, up to and including termination of employment or contract, and may result in legal action.
5. Related Documents
This policy supports the following security controls:
6. Revision History | Version | Date | Author | Changes | |---------|------|--------|---------| | 1.6.0 | 2024-12-10 | Compliance Team | Current version | --- *This document is confidential and proprietary to Mesta Technologies Inc.*
Related Controls (4)
Vendor management program established
All critical vendors assessed for security posture before engagement.
passing
Vendor security reviews conducted
Annual security reviews for all critical vendors and service providers.
passing
Third-party risk register
Register of third-party risks with mitigation strategies.
passing
Data processing agreements signed
DPAs in place for all vendors processing customer data.
passing
Supported Frameworks
Policy Details
- Policy ID
- vendor-third-party-risk-policy
- Category
- vendor
- Author
- Compliance Team
- Approval Date
- 12/10/2024
- Page Count
- 20 pages
Version History
v1.6.01/1/2025
Current approved version