Documentation
HECVAT Lite v3.0.6
Policies, Procedures and Processes
HLPP-03

Question HLPP-03

Do you have a documented information security policy?

Weight40
High RiskYes
RequiredYes
Compliant AnswerYes

Standard Guidance

EDUCAUSE provides no guidance here

Answering "NO"

State plans to implement information security policy at your company.

Answering "YES"

Provide a reference to your information security policy or submit documentation with this fully populated HECVAT-Lite.

Reason for Question

A shared security [responsibility] environment is expected of vendors in today's world. Security offices cannot solely protect an institution's data. Information security, ingrained in an organization, is the best case scenario for the protection of institutional data. Security awareness and practice start in a vendor's policies. The ability for the vendor to respond effectively (and quickly) to a security incident is of the utmost importance. The size of a vendor's security office will determine their capabilities during a security incident, but the incident response plan will oftentimes determine their effectiveness. Use the knowledge of this response when evaluating other vendor statements, particularly when discussing degraded operation states.

Follow-Up Inquiries

If the vendor does not have a documented information security policy, follow-up questions about training, company practices, awareness efforts, auditing, and system protection practices are appropriate.

HECVAT Pro Advice

[Add expert insights and best practices]

Implementation Tips

[Add practical steps for SME SaaS vendors]

FAQ

[Add common questions related to this HECVAT item]

Resources

[Add links to relevant articles or tools]