VENDOR DUE DILIGENCE QUESTIONNAIRE — NEW YORK
Issuing Organization: [________________________________]
Date Issued: [__/__/____]
Due Date for Completion: [__/__/____]
Vendor Risk Tier: ☐ Critical | ☐ High | ☐ Medium | ☐ Low
TABLE OF CONTENTS
- Instructions and Scope
- Vendor Profile and Ownership
- Sanctions, PEP, and Adverse Media Screening
- Services, Data, and Locations
- Information Security Controls
- Privacy and Data Subject Rights
- Subprocessors and Fourth Parties
- Incident Response and Breach History
- Business Continuity and Disaster Recovery
- Certifications, Audits, and Testing
- Insurance Coverage
- Legal and Regulatory Matters
- Financial Viability
- ESG, Ethics, and Anti-Corruption
- New York-Specific Compliance Requirements
- Required Artifacts Checklist
- Attestation and Signoff
1. INSTRUCTIONS AND SCOPE
1.1 Purpose
This VDQ evaluates vendor risk with specific attention to New York's data security and privacy framework: the NY SHIELD Act (N.Y. Gen. Bus. Law § 899-aa, § 899-bb), which requires reasonable safeguards for the private information of New York residents, and the NYDFS Cybersecurity Regulation (23 NYCRR Part 500), which imposes specific third-party service provider requirements on covered financial institutions under 23 NYCRR § 500.11.
1.2 Completion Instructions
- Complete all sections; enter "N/A" where not applicable.
- Attach all requested evidence. Critical/High-tier vendors must provide independent evidence.
- If the issuing organization is subject to NYDFS 23 NYCRR Part 500, the vendor must complete Section 15.2 in full.
2. VENDOR PROFILE AND OWNERSHIP
2.1 Corporate Information
| Field |
Response |
| Legal Entity Name |
[________________________________] |
| DBA |
[________________________________] |
| Date of Incorporation |
[__/__/____] |
| Jurisdiction of Incorporation |
[________________________________] |
| Principal Business Address |
[________________________________] |
| New York Office (if any) |
[________________________________] |
| Website |
[________________________________] |
| EIN |
[________________________________] |
| NY DOS Entity Filing No. |
[________________________________] |
| Entity Type |
☐ Corporation ☐ LLC ☐ Partnership ☐ Sole Proprietorship ☐ Other: [____] |
2.2 Ownership Structure
| Ultimate Parent Company | [________________________________] |
| Publicly traded? | ☐ Yes ☐ No |
Beneficial Owners (10%+):
| Name |
Title |
Ownership % |
Residence |
| [________________________________] |
[________________] |
[____]% |
[________________] |
| [________________________________] |
[________________] |
[____]% |
[________________] |
2.3 Key Contacts
| Role |
Name |
Email |
Phone |
| Primary Business Contact |
[________________] |
[________________] |
[________________] |
| Information Security Lead / CISO |
[________________] |
[________________] |
[________________] |
| Privacy Officer |
[________________] |
[________________] |
[________________] |
| Incident Response Contact |
[________________] |
[________________] |
[________________] |
3. SANCTIONS, PEP, AND ADVERSE MEDIA SCREENING
| List |
Screened |
Match |
| OFAC SDN |
☐ Yes ☐ No |
☐ Yes ☐ No |
| OFAC Consolidated |
☐ Yes ☐ No |
☐ Yes ☐ No |
| UN Consolidated |
☐ Yes ☐ No |
☐ Yes ☐ No |
| EU Consolidated |
☐ Yes ☐ No |
☐ Yes ☐ No |
| UK HM Treasury |
☐ Yes ☐ No |
☐ Yes ☐ No |
PEP among owners/officers? ☐ Yes ☐ No — Details: [________________________________]
Adverse media in past 5 years? ☐ Yes ☐ No — Details: [________________________________]
4. SERVICES, DATA, AND LOCATIONS
4.1 Services
| Field |
Response |
| Services description |
[________________________________] |
| Criticality |
☐ Critical ☐ High ☐ Medium ☐ Low |
| Customer interaction |
☐ Yes ☐ No |
| System access |
☐ Yes ☐ No |
| Access type |
☐ Read-only ☐ Read/Write ☐ Administrative ☐ N/A |
4.2 Data Categories
☐ Private information (as defined in N.Y. Gen. Bus. Law § 899-aa(1)(b))
☐ Social Security Numbers
☐ Financial account numbers with access codes
☐ Driver's license numbers
☐ Biometric data (fingerprints, retina, voice, facial geometry)
☐ Credit/debit card numbers with access codes
☐ Username/email with password or security Q&A
☐ Nonpublic Information (as defined in 23 NYCRR § 500.1, if applicable)
☐ PHI
☐ PCI data
☐ Other: [________________________________]
Estimated volume: ☐ <1,000 ☐ 1,000–10,000 ☐ 10,000–100,000 ☐ 100,000–1M ☐ >1M
4.3 Data Locations
| Location |
Activity |
Data Types |
| [________________________________] |
☐ Processing ☐ Storage ☐ Both |
[________________] |
| [________________________________] |
☐ Processing ☐ Storage ☐ Both |
[________________] |
5. INFORMATION SECURITY CONTROLS
5.1 Access Controls
| # |
Control |
Response |
Details |
| 5.1.1 |
MFA for remote access? |
☐ Yes ☐ No |
[________________] |
| 5.1.2 |
MFA for access to our data? |
☐ Yes ☐ No |
[________________] |
| 5.1.3 |
RBAC implemented? |
☐ Yes ☐ No |
[________________] |
| 5.1.4 |
Least privilege enforced? |
☐ Yes ☐ No ☐ Partial |
[________________] |
| 5.1.5 |
Access reviews? |
☐ Yes ☐ No |
Frequency: [____] |
| 5.1.6 |
Timely access termination? |
☐ Yes ☐ No |
SLA: [____] |
| 5.1.7 |
Privileged access managed separately? |
☐ Yes ☐ No |
[________________] |
5.2 Encryption
| # |
Control |
Response |
Details |
| 5.2.1 |
Encrypted at rest? |
☐ Yes ☐ No |
Algorithm: [____] |
| 5.2.2 |
Encrypted in transit? |
☐ Yes ☐ No |
Protocol: [____] |
| 5.2.3 |
Separate key management? |
☐ Yes ☐ No |
[________________] |
5.3 Network Security
| # |
Control |
Response |
Details |
| 5.3.1 |
Firewalls? |
☐ Yes ☐ No |
[________________] |
| 5.3.2 |
IDS/IPS? |
☐ Yes ☐ No |
[________________] |
| 5.3.3 |
Network segmentation? |
☐ Yes ☐ No |
[________________] |
| 5.3.4 |
Patch management? |
☐ Yes ☐ No |
SLA: [____] |
| 5.3.5 |
Vulnerability scanning? |
☐ Yes ☐ No |
Frequency: [____] |
5.4 Endpoint, Physical, and Logging
| # |
Control |
Response |
Details |
| 5.4.1 |
EDR deployed? |
☐ Yes ☐ No |
[________________] |
| 5.4.2 |
Endpoints encrypted? |
☐ Yes ☐ No |
[________________] |
| 5.4.3 |
Physical security at data centers? |
☐ Yes ☐ No |
[________________] |
| 5.4.4 |
Centralized logging/SIEM? |
☐ Yes ☐ No |
[________________] |
| 5.4.5 |
Log retention ≥12 months? |
☐ Yes ☐ No |
Period: [____] |
6. PRIVACY AND DATA SUBJECT RIGHTS
| # |
Control |
Response |
| 6.1 |
Designated privacy officer? |
☐ Yes ☐ No |
| 6.2 |
Written privacy policy? |
☐ Yes ☐ No |
| 6.3 |
PIAs conducted? |
☐ Yes ☐ No |
| 6.4 |
Data retention schedules documented? |
☐ Yes ☐ No |
| 6.5 |
Secure deletion procedures? |
☐ Yes ☐ No |
| 6.6 |
Deletion certification on termination? |
☐ Yes ☐ No |
7. SUBPROCESSORS AND FOURTH PARTIES
Uses subprocessors? ☐ Yes ☐ No
| Subprocessor |
Services |
Location |
Data Types |
| [________________________________] |
[________________] |
[________________] |
[________________] |
| # |
Control |
Response |
| 7.1 |
Subprocessor due diligence? |
☐ Yes ☐ No |
| 7.2 |
Equivalent contractual terms? |
☐ Yes ☐ No |
| 7.3 |
Notification of changes? |
☐ Yes ☐ No |
8. INCIDENT RESPONSE AND BREACH HISTORY
| # |
Control |
Response |
Details |
| 8.1 |
Documented IRP? |
☐ Yes ☐ No |
[________________] |
| 8.2 |
24/7 response? |
☐ Yes ☐ No |
[________________] |
| 8.3 |
Customer notification SLA |
[____] hours |
|
| 8.4 |
IRP tested annually? |
☐ Yes ☐ No |
Last: [__/__/____] |
Breaches in past 3 years? ☐ Yes ☐ No
| Date |
Nature |
Data Impacted |
Remediation |
| [__/__/____] |
[________________] |
[________________] |
[________________] |
9. BUSINESS CONTINUITY AND DISASTER RECOVERY
| # |
Control |
Response |
Details |
| 9.1 |
BCP documented? |
☐ Yes ☐ No |
|
| 9.2 |
DRP documented? |
☐ Yes ☐ No |
|
| 9.3 |
RTO |
[____] hours |
|
| 9.4 |
RPO |
[____] hours |
|
| 9.5 |
DRP tested annually? |
☐ Yes ☐ No |
Last: [__/__/____] |
10. CERTIFICATIONS, AUDITS, AND TESTING
| Certification |
Maintained |
Covers Services |
Expiration |
| SOC 2 Type II |
☐ Yes ☐ No |
☐ Yes ☐ No |
[__/__/____] |
| ISO 27001 |
☐ Yes ☐ No |
☐ Yes ☐ No |
[__/__/____] |
| PCI DSS |
☐ Yes ☐ No |
☐ Yes ☐ No |
[__/__/____] |
Pen test: Frequency [____] | Last: [__/__/____] | Critical findings remediated? ☐ Yes ☐ No ☐ In Progress
11. INSURANCE COVERAGE
| Coverage |
Carrier |
Limit |
Expiration |
| Cyber/Tech E&O |
[________________] |
$[________________] |
[__/__/____] |
| General Liability |
[________________] |
$[________________] |
[__/__/____] |
| Professional Liability |
[________________] |
$[________________] |
[__/__/____] |
12. LEGAL AND REGULATORY MATTERS
| # |
Question |
Response |
| 12.1 |
All required licenses held? |
☐ Yes ☐ No |
| 12.2 |
Regulatory exams in past 3 years? |
☐ Yes ☐ No |
| 12.3 |
Enforcement actions or settlements? |
☐ Yes ☐ No |
| 12.4 |
Pending litigation? |
☐ Yes ☐ No |
| 12.5 |
Subject to NYDFS regulation? |
☐ Yes ☐ No |
13. FINANCIAL VIABILITY
| # |
Question |
Response |
| 13.1 |
Willing to provide financials? |
☐ Yes ☐ No |
| 13.2 |
Material adverse changes? |
☐ Yes ☐ No |
| 13.3 |
Revenue concentration >25%? |
☐ Yes ☐ No |
14. ESG, ETHICS, AND ANTI-CORRUPTION
| # |
Control |
Response |
| 14.1 |
Code of conduct? |
☐ Yes ☐ No |
| 14.2 |
Anti-corruption program? |
☐ Yes ☐ No |
| 14.3 |
Whistleblower channel? |
☐ Yes ☐ No |
15. NEW YORK-SPECIFIC COMPLIANCE REQUIREMENTS
15.1 NY SHIELD Act (N.Y. Gen. Bus. Law § 899-aa, § 899-bb)
The SHIELD Act, effective March 21, 2020, broadened the definition of "private information" and requires any person or business owning or licensing computerized data that includes the private information of New York residents to implement and maintain "reasonable safeguards" -- including administrative, technical, and physical safeguards. Breach notification must be made to affected individuals "in the most expedient time possible and without unreasonable delay," and to the New York Attorney General, the Department of State Division of Consumer Protection, and the New York State Police if the breach affects New York residents (N.Y. Gen. Bus. Law § 899-aa(8)).
| # |
Requirement |
Response |
Details |
| 15.1.1 |
Does the vendor maintain reasonable administrative safeguards for private information per the SHIELD Act (§ 899-bb(2)(b)(i))? |
☐ Yes ☐ No |
[________________] |
| 15.1.2 |
Does the vendor maintain reasonable technical safeguards (§ 899-bb(2)(b)(ii))? |
☐ Yes ☐ No |
[________________] |
| 15.1.3 |
Does the vendor maintain reasonable physical safeguards (§ 899-bb(2)(b)(iii))? |
☐ Yes ☐ No |
[________________] |
| 15.1.4 |
Can the vendor notify us promptly of a breach involving NY private information? |
☐ Yes ☐ No |
SLA: [____] hours |
| 15.1.5 |
Can the vendor support notifications to the NY AG, DOS, and State Police when required? |
☐ Yes ☐ No |
[________________] |
| 15.1.6 |
Does the vendor process biometric data of NY residents (fingerprint, voice, retina, facial geometry)? |
☐ Yes ☐ No |
[________________] |
| 15.1.7 |
Does the vendor designate an employee or employees to coordinate the data security program? |
☐ Yes ☐ No |
[________________] |
15.2 NYDFS Cybersecurity Regulation (23 NYCRR Part 500)
If the issuing organization is a Covered Entity under NYDFS, 23 NYCRR § 500.11 requires a written third-party service provider security policy. This section addresses those requirements. The November 2023 amendments to Part 500 strengthened third-party oversight obligations, including requiring MFA for third-party access and enhanced incident notification (within 72 hours).
| # |
Requirement |
Response |
Details |
| 15.2.1 |
Does the vendor maintain a cybersecurity program meeting the minimum standards of 23 NYCRR Part 500? |
☐ Yes ☐ No ☐ N/A |
[________________] |
| 15.2.2 |
Has the vendor designated a CISO or qualified designee (§ 500.4)? |
☐ Yes ☐ No ☐ N/A |
Name: [________________] |
| 15.2.3 |
Does the vendor maintain a written cybersecurity policy (§ 500.3)? |
☐ Yes ☐ No ☐ N/A |
[________________] |
| 15.2.4 |
Does the vendor conduct annual penetration testing and bi-annual vulnerability assessments (§ 500.5)? |
☐ Yes ☐ No ☐ N/A |
[________________] |
| 15.2.5 |
Does the vendor maintain audit trail systems (§ 500.6)? |
☐ Yes ☐ No ☐ N/A |
[________________] |
| 15.2.6 |
Does the vendor implement MFA for third-party access to information systems (§ 500.12, as amended Nov. 2023)? |
☐ Yes ☐ No ☐ N/A |
[________________] |
| 15.2.7 |
Does the vendor use encryption for nonpublic information in transit and at rest (§ 500.15)? |
☐ Yes ☐ No ☐ N/A |
[________________] |
| 15.2.8 |
Can the vendor notify within 72 hours of a cybersecurity event (§ 500.17, as amended)? |
☐ Yes ☐ No ☐ N/A |
[________________] |
| 15.2.9 |
Does the vendor maintain an incident response plan (§ 500.16)? |
☐ Yes ☐ No ☐ N/A |
[________________] |
| 15.2.10 |
Will the vendor provide representations regarding its cybersecurity practices to support our annual certification to NYDFS (§ 500.17(b))? |
☐ Yes ☐ No ☐ N/A |
[________________] |
| 15.2.11 |
Does the vendor conduct annual risk assessments (§ 500.9)? |
☐ Yes ☐ No ☐ N/A |
[________________] |
| 15.2.12 |
Does the vendor provide regular cybersecurity awareness training (§ 500.14)? |
☐ Yes ☐ No ☐ N/A |
[________________] |
| 15.2.13 |
Does the vendor's data retention and disposal meet § 500.13 standards? |
☐ Yes ☐ No ☐ N/A |
[________________] |
15.3 Data Retention and Disposal
| # |
Requirement |
Response |
Details |
| 15.3.1 |
Data retention schedule for NY resident data? |
☐ Yes ☐ No |
Period: [________________] |
| 15.3.2 |
Secure disposal procedures? |
☐ Yes ☐ No |
Method: [________________] |
| 15.3.3 |
Written destruction certification? |
☐ Yes ☐ No |
[________________] |
16. REQUIRED ARTIFACTS CHECKLIST
| # |
Document |
Provided |
N/A |
| 16.1 |
Information Security Policy |
☐ |
☐ |
| 16.2 |
Privacy Policy |
☐ |
☐ |
| 16.3 |
Incident Response Plan |
☐ |
☐ |
| 16.4 |
BC/DR Plan |
☐ |
☐ |
| 16.5 |
SOC 2 Report |
☐ |
☐ |
| 16.6 |
Pen Test Summary |
☐ |
☐ |
| 16.7 |
Subprocessor List |
☐ |
☐ |
| 16.8 |
Insurance Certificate(s) |
☐ |
☐ |
| 16.9 |
NYDFS Cybersecurity Program Documentation |
☐ |
☐ |
| 16.10 |
CISO Designation / Qualifications |
☐ |
☐ |
| 16.11 |
Sample DPA |
☐ |
☐ |
17. ATTESTATION AND SIGNOFF
I certify that the information provided is true, complete, and accurate. I commit to notifying the issuing organization within ten (10) business days of material changes.
| Field |
Information |
| Name |
[________________________________] |
| Title |
[________________________________] |
| Signature |
[________________________________] |
| Date |
[__/__/____] |
SOURCES AND REFERENCES
- NY SHIELD Act, N.Y. Gen. Bus. Law § 899-aa, § 899-bb (eff. Mar. 21, 2020)
- NYDFS Cybersecurity Regulation, 23 NYCRR Part 500 (2017; amended Nov. 1, 2023)
- 23 NYCRR § 500.11 (Third-Party Service Provider Security Policy)
- 23 NYCRR § 500.12 (Multi-Factor Authentication, as amended)
- 23 NYCRR § 500.17 (Notices to Superintendent, as amended)
- OCC Bulletin 2023-17, "Third-Party Relationships: Risk Management Guidance"
- FFIEC IT Examination Handbook
This template is provided for informational purposes only and does not constitute legal advice. Consult qualified legal counsel before use.