AiRo Digital Labs (“AiRo Digital Labs”) is committed to maintaining the highest standards of information security and data protection. This Supplier Compliance Policy outlines the obligations and expectations for our Suppliers regarding the confidentiality, integrity, and availability of information. Suppliers are expected to adhere to these principles and guidelines to ensure compliance with our security and data protection standards.
a) For India Suppliers: Access our Information Security Management System Policy Statement.
b) For US Suppliers: Access our Information Security Management System Policy Statement.
Definitions
For the purpose of this policy:
a. Supplier: Any individual, company, or entity that provides goods, services, or access to systems or data to AiRo Digital Labs.
b. MSA (Master Services Agreement) / MCA (Master Consulting Agreement): A formal written agreement that outlines the terms and conditions under which a Supplier provides goods or services to AiRo Digital Labs.
c. NDA (Non-Disclosure Agreement): A legally binding agreement that governs the sharing of confidential information between AiRo Digital Labs and a Supplier.
d. Confidential Information: Any information, data, or material that is not publicly available or generally known, which is considered sensitive, proprietary, or confidential by AiRo Digital Labs. This includes, but is not limited to, trade secrets, customer data, business plans, financial information, pricings and costs, proprietary software, and any information marked as "confidential."
e. Data Encryption: The process of converting plain-text data into an unreadable format (cipher text) using encryption algorithms and encryption keys to protect data confidentiality.
f. Incident Response Plan: A documented strategy outlining the actions to be taken when a security incident or data breach occurs, including procedures for identifying, containing, and mitigating the incident.
g. Data Classification Framework: A systematic approach for categorizing data based on its sensitivity or criticality to the organization, often using labels such as "confidential," "internal use only," or "public."
h. Encryption Protocols: Secure communication methods and standards, such as SSL/TLS, IPsec, or PGP, used to protect data during transmission over networks.
i. Vulnerability Assessment: A systematic process of identifying and evaluating weaknesses in systems, applications, or processes that could be exploited by attackers.
j. Penetration Testing: A simulated attack on a computer system or network to identify vulnerabilities and assess security controls.
k. Data Retention Policy: A documented policy that defines how long data should be retained and when it should be securely disposed of or archived based on legal, business, and regulatory requirements.
l. Access Control Systems: Technical and physical mechanisms, such as key cards, biometrics, and authentication protocols, used to regulate access to facilities or systems.
Confidentiality, Integrity, and Availability of Information
a. Access Control:
Suppliers shall implement robust access controls, including role-based access, strong authentication, and authorization mechanisms, as specified by AiRo Digital Labs.
b. Data Encryption:
Suppliers must encrypt sensitive data both at rest and in transit using industry-standard encryption protocols approved by AiRo Digital Labs.
c. Regular Audits:
Suppliers shall conduct periodic security audits and assessments to identify vulnerabilities and ensure compliance with AiRo Digital Labs' security policies.
d. Incident Response Plan:
Suppliers must develop and maintain an incident response plan to address security breaches promptly and effectively in accordance with AiRo Digital Labs' guidelines.
e. Employee Training:
Suppliers shall provide comprehensive security training to their employees to raise awareness and educate them on security best practices as defined by AiRo Digital Labs. AiRo Digital Labs expects the Supplier to demonstrate this as and when required.
Mitigation of Non-Compliance
a. Monitoring Tools: Suppliers are expected to implement continuous monitoring tools and systems to detect non-compliance issues in real-time and report them to AiRo Digital Labs.
c. Corrective Actions:
In the event of non-compliance, Suppliers are required to develop a corrective action plan that includes root cause analysis and preventive measures. These plans must be shared with AiRo Digital Labs.Information Transfer and Security
a. Data Classification:
Suppliers shall classify data based on its sensitivity to determine appropriate transfer mechanisms and security controls in alignment with AiRo Digital Labs' data classification framework.
b. Secure Data Transfer Protocols:
Suppliers are obligated to use secure communication protocols (e.g., VPNs, encrypted channels) for transferring sensitive information as per AiRo Digital Labs' standards.
c. Data Transfer Logs:
Maintain logs of data transfers to ensure transparency and traceability. Provide access to these logs for auditing purposes if requested by AiRo Digital Labs.
d. Data Transfer Agreements:
Suppliers must establish clear agreements and protocols for transferring data to AiRo Digital Labs, including responsibilities, encryption requirements, and other security measures.
Secure Disposal of Information
a. Data Retention Policy: Suppliers shall develop and enforce a data retention policy specifying how long data should be retained and when it should be securely disposed of, aligning with AiRo Digital Labs' policies.Personnel and Physical Security
a. Access Control Systems:
Suppliers must implement access control systems (e.g., key cards, biometrics) to restrict physical access to facilities as required by AiRo Digital Labs.
b. Visitor Logs:
Maintain visitor logs and require visitors to sign in and out when entering and leaving facilities in line with AiRo Digital Labs' visitor access policies.
c. Employee Background Checks:
Conduct background checks on employees to ensure trustworthiness and security clearance, if applicable, as specified by AiRo Digital Labs.
d. Security Awareness Training:
Provide security awareness training to employees regarding physical security measures and procedures, following AiRo Digital Labs' standards.
Information Access and Handling
a. Access Requests: Suppliers shall establish a formal process for requesting access to information and assets, including approval mechanisms consistent with AiRo Digital Labs' access control policies.Indemnity and Penalties for Non-Compliance
a. Non-Compliance Penalty: In case of non-compliance, the Supplier shall be liable to pay a penalty determined as specified in the agreement with AiRo Digital Labs. In case no quantum is defined in the Agreement then the damages payable for the violation / breach of this policy shall be USD 100,000 or actual damage which ever is higher.Data Breach Notification
a. Prompt Notification: In the event of a data breach, the Supplier shall promptly but not later than 48 hours from the time of such incidence, notify AiRo Digital Labs in accordance with legal requirements and provide assistance in mitigating potential harm, as outlined in the agreement.Training and Awareness
a. Employee Training: Ensure that employees are adequately trained and aware of data protection and information security practices, fostering a culture of vigilance and responsibility, as detailed in AiRo Digital Labs' security awareness program.Continuous Improvement
a. Regular Review: Commit to regular review and update of security measures to adapt to evolving threats and regulations, aiming for continuous improvement in data protection and information security practices in collaboration with AiRo Digital Labs.Incorporation into Other Agreements and Conflict Resolution
Wherever referred, this document shall be read as part of the applicable MSA, NDA, or any other document governing the relationship between AiRo Digital Labs and the Supplier. In case of any conflict between this policy and an agreement document, the terms and conditions of the agreement document shall prevail.Effective Date:
This Supplier Data Integrity and Compliance Policy is effective from May 4th, 2023 and it supersedes all existing policies on the subject matter.