Welcome Vendors!

The Open VRM way for you to share due diligence information with your clients.
Geometric shapeGeometric shapeGeometric shapeGeometric shapeGeometric shapeGeometric shapeGeometric shapeGeometric shapeGeometric shapeGeometric shapeGeometric shape
Step 1

Provide Vendor Due Diligence Information your Clients Needs to Review

On your Company Website

Publish your Security Policy

Outlines an organization's approach to protecting its assets, information, and systems from unauthorized access, misuse, or other threats. It establishes the organization's rules, standards, and guidelines for cybersecurity practices, aligning with its broader operational goals and compliance requirements.

Publish your Privacy Policy & Notice

Disclose how vendors collect, use, store, and share the personal information of individuals, such as customers, employees, or other stakeholders. If information is shared, vendors must indicate if and how individuals can opt-out. It is a critical document for demonstrating transparency and compliance with regulations such as the Gramm-Leach-Bliley Act (GLBA), guidelines referenced by the SEC, the California Consumer Privacy Act (CCPA), the California Privacy Rights Act (CPRA), many other state regulations, and GDPR.

Review your Contract Provisions

Govern your obligation to your clients: Commitment to cybersecurity safeguards and compliance, breach reporting, conditions for terminating the relationship and, in this case, how data would be protected, etc.

On Open VRM

Answer the Open VRM Questionnaire

56-question assessment designed to streamline vendor risk evaluations. It covers key areas such as the vendor’s financial situation, history of past breaches, potential legal issues, and a summary cybersecurity program requirements. This straightforward questionnaire provides organizations with a clear and efficient way to assess vendor risk, ensuring critical areas of concern are addressed while minimizing the burden on vendors to complete lengthy or complex assessments.

Indicate how clients access Vendor Due Diligence information (4 options)

Option 1. On Open VRM
Option 2. On Vendor’s Trust Center
Option 3. On a VRM Software selected by the Vendor
Option 4. Via email

Share Standard or Framework Attestation or Certification

Serves as proof that a vendor complies with recognized industry security standards or frameworks, such as ISO 27001, SOC 2 Type 1 and 2, NIST, or PCI DSS. These attestations or certifications are conducted by independent auditors and validate the vendor's implementation of necessary security controls and practices to protect data and systems.

Share Proof of Cyber Insurance

Provides financial protection against cyber incidents, such as data breaches, ransomware, or system failures. It ensures vendors can cover costs related to recovery, legal fees, and liability, minimizing business disruption.

Publish Your Questionnaire!

Share your questionnaire and evidence documentation with your clients securely. Rest assured, no one can access the information without your approval.
Step 2

Select How Clients Access your Vendor Due Diligence Information

Option 1. Open Access to All Clients

All clients with an Open VRM account can access your Vendor Due Diligence information. This facilitate the revision of you information by potential clients with whom you may not have a relation yet..

Option 2. Clients Must Request Access (Default)

This is the default setting. Clients must request access that you will have to approve.

Option 3. Clients Must Signed Document(s)

Client must sign documents (NDA, etc.) that you upload on the platform. You will have to manually approve the access after the revision of the signed document(s).
Step 3

Annually Update Your Vendor Due Diligence Information

Privacy Notice

If there are any changes, you must share with your clients the updated version.

Questionnaire

The questionnaire is automatically copied for your review.

Evidence Documentation

You must upload updated version of your evidence documentation.

Start Now To Leverage Open VRM

Eliminate Never-Ending Spending & Optimize Vendor Risk Management Process