VENDOR DUE DILIGENCE QUESTIONNAIRE
TABLE OF CONTENTS
- Instructions and Scope
- Vendor Profile and Ownership
- Sanctions/PEP/Adverse Media
- Services, Data, and Locations
- Security Controls
- Privacy and Data Subject Rights
- Subprocessors and Fourth Parties
- Incident Response and Breach History
- Business Continuity and Disaster Recovery
- Certifications and Testing
- Insurance
- Legal/Regulatory Matters
- Financial Viability
- ESG and Ethics
- Required Artifacts Checklist
- Attestations and Signoff
- Texas Privacy Supplement
1. INSTRUCTIONS AND SCOPE
- Complete all sections; note "N/A" where not applicable.
- Attach evidence requested; ensure answers reflect actual controls.
- Critical/high-risk vendors must provide supporting artifacts.
2. VENDOR PROFILE AND OWNERSHIP
- Legal name, address, formation jurisdiction, registration numbers.
- Ultimate parent, subsidiaries involved, beneficial owners >=10%, board/officers.
- Contacts: business, security, privacy, incident, billing.
3. SANCTIONS/PEP/ADVERSE MEDIA
- Confirm screening against major lists (OFAC, UN, EU, UK, local).
- PEP status of owners/officers; adverse media findings; remediation steps if any.
4. SERVICES, DATA, AND LOCATIONS
- Services provided; criticality to our operations.
- Data types handled (PII, PHI, PCI, trade secrets); volume; data residency and storage/processing locations.
- Cross-border transfers and transfer mechanisms (SCCs/IDTA/other).
5. SECURITY CONTROLS
- Access controls (MFA, RBAC), encryption (in transit/at rest), key management.
- Network security, vulnerability management, patching cadence, secure SDLC, logging/monitoring, segregation of duties.
- Physical security for data centers/offices.
- Endpoint protection, mobile/BYOD controls.
- Penetration testing frequency and remediation approach.
6. PRIVACY AND DATA SUBJECT RIGHTS
- Lawful bases (where applicable), notices, consents, and purpose limitation.
- Data minimization, retention periods, deletion procedures, return/transfer on termination.
- DSR handling (access, deletion, correction, portability), timelines, and verification steps.
7. SUBPROCESSORS AND FOURTH PARTIES
- List subprocessors; services provided; locations; data types; onboarding diligence.
- Change notification process and approval rights.
8. INCIDENT RESPONSE AND BREACH HISTORY
- Incident response plan, timelines, and notification commitments.
- Breach history (last 3 years): dates, nature, data impacted, remediation.
- Forensic partners and playbooks.
9. BUSINESS CONTINUITY AND DISASTER RECOVERY
- RTO/RPO targets; DR testing frequency and results; backup strategy and media; single points of failure; pandemic/geo disruption planning.
10. CERTIFICATIONS AND TESTING
- Current certifications: SOC 2 (Type I/II), ISO 27001, HITRUST, PCI DSS, others.
- Last audit dates and exceptions; penetration test reports (summary) and remediation status.
11. INSURANCE
- Coverage types/limits: cyber, E&O, GL, professional, crime; expiration dates; carriers.
12. LEGAL/REGULATORY MATTERS
- Required licenses/registrations; regulatory exams; consent decrees/settlements; pending litigation related to services.
- Export controls classification and licensing (if applicable).
13. FINANCIAL VIABILITY
- Provide recent financials or SOC section on going-concern; key revenue concentration risks; material adverse changes.
14. ESG AND ETHICS
- Code of conduct/ethics; anti-corruption program; whistleblower channel; modern slavery/forced labor policies; environmental commitments (if applicable).
15. REQUIRED ARTIFACTS CHECKLIST
- Policies: security, privacy, incident response, business continuity.
- Certifications/reports: SOC/ISO/PCI; recent pen test summary.
- Subprocessor list; data flow diagram; DPIA (if available); insurance certificates.
- Sample contract terms (DPA, security addendum), breach notification commitments.
16. ATTESTATIONS AND SIGNOFF
- Authorized representative attests accuracy as of [DATE].
- Name, title, signature, contact; date signed.
17. TEXAS PRIVACY SUPPLEMENT
- Confirm support for TDPSA consumer requests (access, deletion, correction, portability, opt-out of targeted advertising, sale, and profiling).
- Describe data protection assessment support for high-risk processing.
- Confirm biometric consent process under Texas law if biometric identifiers are processed.
- Provide Texas breach notification escalation and notification commitments.