How do you document that you process sensitive personal data correctly?
Employee data, customer data, etc. are typically processed both by you and your suppliers. But your company is responsible for the correct processing of data. Therefore, you need to ask your supplier for documentation to prove they’re GDPR compliant.
Which control targets do you have in place?
Make sure to ask which control targets your supplier has in place related to data security and IT infrastructure. A control target could e.g. be a process for managing GDPR incidents, or adequate knowledge about which systems manage which data, especially personal data.
A significant part of ISAE 3402 is to set up a number of documented control targets that are controlled by a specialised auditor.
When did you last assess your IT compliance?
Ask your supplier how often they revise, validate and update their IT policy and security. Companies often purchase new programs, IT tools or apps, and that must be reflected in the processes and documentation. Det er ikke nok, at en leverandør har lavet en IT-politik tilbage i 2018, da GDPR blev indført. It must be updated all the time.
Unlike the ISO 2700X certifications, the control of ISAE 3402 and ISAE 3000 is performed every year. An ISO 2700X certification doesn’t need renewal, but shows that the conditions were met at the time of the certification. So, if your supplier has an ISO certification, ask when it was done.
Do you revise both processes and procedures and physical and logistical security?
How often do you visit your supplier? Maybe they’re placed completely or partially in a different country? An ISAE 3402 declaration includes a physical audit of the security.
What is your procedure for processing sensitive personal data?
Before you implement a new system in your company, you need to know the entire process for how your supplier processes your, your customers’ or your employees’ data. In Europe, all companies are governed by the same rules related to GDPR. You need to be aware of the documentation of how the company lives up to these rules.
What is your procedure in case of a security breach?
Ask how the supplier manages a security breach. And note if they have a standardised and documented process.
Are your data accessed by someone without permission, your supplier is obligated to inform you. With an ISAE 3000 declaration, you’re guaranteed this will happen. The reason is that companies who obtain an ISAE declaration set up procedures that are revised regularly.
Which data do you process?
You probably have an idea about which data your supplier should process. But make sure your supplier can document the data they process. Also if your supplier used sub-suppliers or partners.
With an ISAE 3000 declaration, you can see an exact overview of which data are processed. And then you don’t need to investigate it yourself.
Which risks have you covered in connection to the processing of my data?
It’s always good to be prepared. So before you enter into a cooperation with a new supplier, you need to ask for a thorough description of the risk they have listed related to their data processing.
With ISAE 3402 you are sure that processes and procedures related to data are controlled and approved by an independent specialist.
How do you ensure the collaboration between your IT security and GDPR obligations?
Many companies are relatively good at describing how they comply with the GDPR rules. But it’s as important that the IT security, e.g. systems, infrastructure and processes, work with your GDPR measures, and that the IT security is as well-documented as the GDPR policy.
Without IT security, GDPR measures have no value. If you want to be on the safe side, look for a supplier with both an ISAE 3000 and an ISAE 3402 declaration.
How do you document that the IT security in your company mature and improve constantly?
You’d like to know that you have a supplier, where security is not just a buzzword, but an integrated part of the organisation. A demand as part of ISAE 3402 is internal education related to IT security, data processing, etc. Ask your supplier what they do to make sure that employees also think about IT security and GDPR as part of their daily work routines.