Facilities and Security Schedule V1.4
Transcription
Facilities and Security Schedule V1.4
Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 Supplier Security Standard v2.9 Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 Introduction Sky operates in an environment of significant legislative, regulatory and industry standards compliance requirements and must have continued assurance that information and data for which Sky is responsible is secure against accidental or unauthorised disclosure, manipulation, damage or loss. Sky implements security controls across its business and in its computer facilities with the aim of ensuring the confidentiality, integrity and availability of data. Sky requires that the same level of protection is in place for data handled by its suppliers and that they are aware of the risks that exist if controls are missing or where known vulnerabilities remain to be addressed. This Sky Security Standard (the “Standard”) contains the information assurance controls Sky requires its suppliers and business partners to employ when they are entrusted with handling Sky Data or materials. Sky considers these controls to be the minimum standards to be implemented across a supplier's systems and infrastructure. This document forms part of the Agreement and as such sets out the contractual obligations Sky places on suppliers in regards to security controls. All suppliers who process personal data are categorised by Sky as either “Tier 1”, “Tier 2” or “Tier 3”. Tier 1 suppliers are those who process data that is classified as “Secret” by Sky; while Tier 2 suppliers are those who process “Confidential” data. Suppliers that process all other types of personal data are classified as Tier 3. Guidance on the application of these definitions can be found in Appendix 1. This Standard sets out in separate sections the controls that are applicable to suppliers who process Tier 1 or Tier 2 data. While these controls do not apply to Tier 3 data, all Sky Data should be processed safely and securely regardless of its classification. Sky wishes to draw particular attention to the fact that the Supplier who is originally classified as Tier 2 but then, by virtue of receiving additional data in the course of that service or additional services are provided, becomes the holder of Tier 1 data will be expected to adhere to the standards set out in the Tier 1 section before receiving the new data or providing the additional services. We also draw attention to the fact that the requirements of this Standard apply only to those locations and associated systems and controls that are used to process Sky Data. This means that if the Supplier has multiple locations, only those that are used to process Sky Data are within scope of this Standard, and for systems, only those systems used to process Sky Data. The provisions contained in this Standard are supplemental to, and in addition to, any other contractual terms contained in the Agreement and, except to the extent that the Supplier and Sky expressly agree to the contrary, in writing and signed between them, the terms of the Agreement shall not be construed as limiting the provisions of this Standard (and vice versa). To the extent that there is any conflict between the provisions of this Standard and the Agreement, this Standard shall prevail. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 2 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 Tier 2 Suppliers The requirements set out in this section are only for those suppliers who are categorised by Sky as “Tier 2”, which are those that hold Sky’s Confidential Data. The Supplier’s compliance with these requirements, as they apply to personal data, will be assessed by Sky’s Audit, Risk Management and Compliance (“ARMC”) department. This work will be performed prior to Supplier being given access to Sky Data and will entail, at a minimum, an assessment of the Supplier’s responses to this Standard and may include an on-site audit, depending on the type of data to be held, and the volume. The process to be followed will already have been set out in writing by your Sky Business Relationship Owner. ARMC is happy to work with suppliers to address any issues that arise as a result of requiring compliance with this Standard. Where the Supplier holds external validation or certification over the systems and processes that will be used to protect Sky’s Data and/or Sky Materials such as an SSAE16 (or equivalent), a copy should be provided to Sky in addition to the completion of obligations in this Standard. Suppliers will be required to complete an annual re-certification when requested by ARMC which may also involve an on-site visit, in accordance with Sky’s policy of visiting all suppliers who hold Sky Data as part of a rolling programme of audits. Tier 1 Suppliers The requirements set out in this section are only for those suppliers who are categorised by Sky as “Tier 1”, which are those that hold Sky’s Secret Data. Tier 1 suppliers must obtain annual independent certification to demonstrate the operation of the controls set out in this Standard. The independent certification must be provided prior to the initial receipt of data, and annually thereafter, in accordance with the timetable communicated to the Supplier by ARMC. The review to support such independent certification should be conducted against appropriate professional standards and be delivered against the International Standard on Assurance Engagements 3402; “Assurance Reports on Controls at a Service Organisation”; an SSAE16 report; or a report in an equivalent format. The SSAE16 reports for new suppliers should be in the form of ‘type 1’, as at a point in time, to demonstrate that controls are in place prior to receiving Sky Data and, in subsequent years, in the form of ‘type 2’, which confirms the operation of the controls over the preceding 12 month period. The report must set out the controls that are in operation to demonstrate compliance with this Standard and specify the testing that has been performed by the independent verifier and the results. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 3 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 The review should be commissioned directly by the Supplier and should, after the initial submission, be for the 12 month period ending 31 December of each year. The report should be executed by PriceWaterHouseCoopers, E&Y, Deloitte, KPMG, Grant Thornton or Detica. A Supplier who intends to use an alternative verifier must seek approval in writing from Sky in advance to confirm that the verifier is acceptable to Sky. The terms used in this standards document are defined in Appendix 1. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 4 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 Sky Security Standard for Tier 2 Suppliers The following requirements apply only to those suppliers who have been designated by Sky as Tier 2. The requirements for Tier 1 suppliers are set out in a separate section in this document. 1 Anti-Bribery and Corruption 1.1 The Supplier shall provide a copy of employee codes of conduct covering anti-bribery and corruption, whistle-blowing and ethics policies in place that have been clearly communicated to all staff. 1.2 Show that there are mechanisms in place to ensure compliance with these policies. 2 Data Protection Governance 2.1 Accountability for data protection across all jurisdictions is clearly assigned. 2.2 A clear data protection policy, which includes retention and destruction times, is in place. 2.3 Day to day responsibilities for data protection have been clearly defined and communicated to all relevant staff. 2.4 A training log demonstrating that all staff with access to Sky Data have successfully completed data protection training is maintained. 2.5 Staff are aware that they need to notify Sky of any security breaches relevant to Sky. 2.6 A process is in place to advise Sky of any data protection breaches. 2.7 There have been no unreported data breaches in the last 12 months. 3 Notice, Choice and Consent 3.1 Supplier will advise Sky in writing if the processing of data changes from what was originally intended under the contract with Sky, and this must be notified to Sky before any change in processing occurs. 3.2 The Supplier will provide individuals whose data is likely to be processed with an additional privacy notice, before such additional processing, that specifies how the Supplier intends further to process the data and for what specified purpose. 3.3 The processing of Sky Data will be justified either: 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 5 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 (i) (ii) through having obtained the consent of the individuals; or by another condition notified to Sky in advance of the change. 4 Data Collection 4.1 Data collected and/or processed by the Supplier will be restricted only to that which is required to fulfil the Services. 4.2 Where marketing activities are carried out on Sky’s behalf, such marketing must be carried out in accordance with the scope of the individuals’ permissions, and such scope and permissions can be evidenced for each individual. 4.3 There are controls in place to ensure that consumers’ chosen marketing preferences are adhered to. 4.4 Where web sites are used to collect Sky Data and/or cookie codes, this is done in accordance with the privacy notice displayed on the website and any other applicable privacy and cookie statements. 4.5 Supplier has a policy explaining how it uses personal data and cookies (if they are used). 5 Subject Data Access 5.1 Supplier staff are aware how to identify a subject access request (“SAR”) and what to do when they receive a SAR relating to Sky Data. 5.2 The Supplier has the requisite functionality on all systems which will hold Sky Data and/or Sky Materials to enable the Supplier to comply with SARs on a timely basis. 6 Data disclosure to Third Parties (including for all Subcontractors) 6.1 Where Sky Data will be processed by third parties including Subcontractors, the Supplier will provide: (i) A list of all third parties; (ii) What data will be accessible by them; and (iii) How the Supplier will ensure the data is kept secure. This includes, for example, outsourced data centres or call recording suppliers. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 6 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 6.2 Where Sky Data is processed by a third party, written contracts are in place with all such third parties to cover the disclosure of Sky Data to them. The Supplier will state whether those contracts require the third parties to have in place the same levels of control and security as set out in this standard and how the Supplier assures this is the case. 6.3 If Sky Data will be processed outside the European Economic Area, there is a written agreement in place covering such processing. This would include, for example, where data or backups are processed by teams in overseas outsourced data centres or in the Cloud. 7 Supplier Responsibilities and Subcontractor Management 7.1 Responsibilities for physical security, risk management and IT security are clearly defined and allocated. 7.2 The Supplier has a contractual obligation to conduct a full annual security audit of all Subcontractors who will hold Sky Data. The Supplier has conducted such audits at the Subcontractor in the past; or The Supplier intends to conduct such audits if the Subcontractor is new under the proposed contract and the Supplier will notify Sky by when these audits will be conducted. 7.3 The Supplier will notify Sky if it intends to process Sky Data and/or Sky Materials in such a way as to aggregate and/or anonymise the data for Supplier use. 7.4 The Supplier will notify Sky if it intends to process or otherwise make use of Sky Data, and/or Sky materials for any purpose other than that which is directly required for the supply of the Services. 7.5 The Supplier maintains a register of data protection breaches, reportable to Sky, which includes breaches that have arisen under the conduct of a Subcontractor. 7.6 All complaints relating to personal data, including complaints received by Subcontractors are captured and recorded. 8 Personnel Security 8.1 Where appropriate to the nature and classification of data handled by the Supplier, and as agreed with Sky, screening checks may be conducted on Supplier Personnel including reference checks and, where applicable, financial probity checks. As appropriate to the job role and permitted by law, criminal record checks are to be conducted. Where appropriate, these checks are refreshed on a periodic basis. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 7 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 The results are logged and recorded. 8.2 All Supplier Personnel sign an agreement which requires them to keep information confidential. This also covers Sky Data and/or Sky Materials. 8.3 The Supplier has a comprehensive code of conduct in place which includes requirements for Supplier Personnel to demonstrate awareness of procedures around breaches of security. 8.4 As part of the Agreement, Supplier Personnel are required to agree to adhere to all Supplier company policies, rules and procedures, including applicable data protection policies. 8.5 There is a clear process to handle Supplier Personnel who terminate their services with the Supplier. Access to Sky Data, facilities and Sky Materials is removed from those Supplier Personnel within one week. 9 Physical and Environmental Security 9.1 The Supplier has a clearly defined physical security policy and related standards. 9.2 The requirements of the physical security policy are applied to all locations that will be used to support Sky operations, including locations used by Subcontractors who will process Sky Data. 9.3 Access to all entry points where Sky Data will be processed, including those at locations used by Subcontractors, is restricted and logged. 9.4 The access logs are reviewed. 9.5 Controls are in place at all premises where Sky Data will be held, to prevent unauthorised individuals from entering. 9.6 Physical and environmental controls are in place within the data centre(s) and communications rooms, including those provided or used by Subcontractors, in order to protect against the loss or damage to the premises or equipment. 9.7 The areas in 9.6 above are covered by an internal and external CCTV system which is used and monitored. The system has sufficient coverage and capability to monitor reception areas, exit / entry points, and vulnerable or sensitive / confidential working areas. 9.8 A monitored alarm system is in place across all sites to be used for Services. 9.9 A clear desk policy is operated at all sites where Sky Data is processed. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 8 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 10 Incident Response 10.1 All security incidents are logged with their origin and resolution recorded. 10.2 There is a clear escalation process. 11 Business Continuity and Disaster Recovery 11.1 There are business continuity and disaster recovery plans in place. 11.2 The plans are tested annually. 11.3 Off-site backups are taken on a regular basis and are encrypted and securely transported. 11.4 Capacity monitoring is in place for those systems that will support the Services 12 IS Security 12.1 The Supplier adopts Sky’s IS security policy and standards; or The Supplier has its own IS Security policy of equal rigour in place, and will provide a copy to Sky. 12.2 All Supplier systems and related control processes to be used to process Sky Data are compliant with Sky’s Group IS Security policies and standards; or Supplier systems that will be used to transmit and/or store Sky Data adhere to the supplier's own IS security policy. This includes but is not limited to: • • • • • • Network (including firewall and intrusion detection) security Malicious code prevention including anti-virus (state frequency of updates) Encryption (provide type) Masking of personal data (for financial transactions) Patching (state frequency and approach, particularly with reference to security patches and associated criticality) Cookies (state how supplier adheres to applicable privacy law requirements as illustrated by ICO guidance) 12.3 All Sky Data is transferred or exchanged via secure channels and/or where technically possible, subject to an appropriate level of encryption. 12.4 Penetration testing is regularly conducted on the network perimeter and infrastructure, and websites used to host, process or transmit Sky Data. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 9 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 12.5 The Supplier will provide details of the date the last tests were performed and whether any identified issues have been resolved. 12.6 Reviews of firewall and remote access logs are performed on a periodic basis. 12.7 Systems which will hold Sky Data enforce areas such as: (i) Unique user identification and prevention of shared logon credentials; (ii)Complex passwords (state the minimum length enforced by the systems and applications processing Sky Data, whether they are alpha numeric and what the expiry period is); (iii) Controls to track the addition and deletion of users and regular review of allocated rights and privileges; (iv) Controls to log sensitive user transactions; (v) Default (admin) user name and passwords are changed; and (vi) Segregation of duties. 12.8 System development, test, and production environments are separated to reduce the risks of unauthorised access or changes. 12.9 All new services, applications and tools used to enable or support the hosting, processing or transmission of Sky Data, or changes made to them, are subject to an appropriate level of testing conducted in accordance with appropriate guidance (such as OWASP) before launch. Sky Data is not used for testing purposes unless it has been suitably anonymised such that it no longer represents personally identifiable data. 12.10 Use of any media to record, store or process Sky Data (including hard copy output, laptops, USB sticks, pen drives, CDs, or other magnetic media) is suitably authorised, handled, transported and encrypted. 12.11 There is a log of system changes which details why the changes were required, who approved them and how and when the changes were executed. 13 Data Management 13.1 The Supplier follows Sky’s Data Retention and Destruction policy and standards or alternatively the Supplier has its own policy of equal rigour, and will provide a copy to Sky. 13.2 The Supplier will state its proposed retention period for Sky Data (listed by type if a single period is not to be enforced). 13.3 Processes are in place to ensure and demonstrate compliance with the policy. 13.4 The Supplier has a process in place to ensure maintenance of the integrity and accuracy of Sky Data. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 10 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 13.5 The Supplier has a process to authorise who receives all reports that the Supplier intends to generate that contain Sky Data. 14 Customer Protection 14.1 Where Services involve the Supplier in direct interaction with customers, the Supplier provides ID passes for those personnel who will interact with customers, for example by visiting customers’ premises. 14.2 The Supplier has a procedure in place for dealing with vulnerable customers. 15 Continued Compliance 15.1 The Supplier will maintain compliance with this Standard at all times during the provision of the Services and will notify Sky promptly in the event that it is not at any time fully compliant. 15.2 The Supplier will provide any other information that would assist Sky in assessing the Supplier’s control environment relevant to the services provided to Sky. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 11 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 Sky Security Standards for Tier 1 Suppliers The following requirements apply only to Tier 1 suppliers and should, as noted, be subject to independent verification. 1 Anti-bribery and Corruption 1.1 The Supplier shall at all times: - maintain an anti-bribery and corruption policy which complies with the Bribery Act 2010 and any other applicable statute, regulation or industry code, and has top level management support; - ensure that proportionate procedures are put in place to mitigate the bribery risks faced by its organisation; - ensure that the anti-bribery and corruption policies are adequately communicated to employees and appropriate training is provided and can be evidenced; and - ensure that a whistle blowing policy/grievance procedure exists so that alleged instances of bribery and/or corruption can be reported on a confidential basis and that there is a means available for personnel to report security issues other than via line management as necessary. 2 Data Protection 2.1 The Supplier shall at all times ensure that a Data Protection policy exists, across all jurisdictions, to safeguard data in accordance with the terms of the Agreement, the Data Protection Act 1998 and any other applicable statute, regulation or industry code. 2.2 Where any Sky Data is intended to be transferred, stored or processed outside the European Economic Area (“EEA”) the Supplier shall provide in advance of any transfer full details of the locations and what data is to be transferred, stored or processed outside the EEA for Sky approval, such approval not to be unreasonably withheld. 2.3 The Supplier shall maintain a controlled paper environment by ensuring that paperwork shall be kept to a minimum and where appropriate for the services provided to or on behalf of Sky, that Sky customer financial data (including, but not limited to, payment card or bank detail) is never written down or otherwise extracted from the appropriate system. 2.4 The Supplier shall ensure that shredding facilities or confidential waste bins are present in each operations area and a process is implemented to suitably dispose of such material securely. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 12 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 3. Payment Card Industry Data Security Standards (where applicable to services) 3.1 Where financial transactional functionality is (or becomes) a part of Services to Sky, the Supplier shall: - comply with the latest version under the PCI DSS requirements; - maintain a strategy for PCI DSS compliance in accordance with the Supplier’s corporate information security policy which addresses each of the PCI DSS requirements and shall assign responsibility for PCI DSS to a designated person or compliance function; - provide evidence annually to Sky of PCI compliance through external certification or self-assessment declaration; - provide Sky with access to evidence that is used in supporting the supplier’s PCI compliance accreditation upon request; - ensure that a current network configuration diagram is produced and maintained to show clear data flows (including Sky’s payment card transactions) and to ensure that all connections (including Sky’s cardholder data) are identified, including any wireless networks; - not disclose Sky cardholder data to any third party or entity with the exception of where this is authorised by Sky under the provision of Services to Sky or required by law; - maintain and provide on request a scope of the environment that is included in the assessment (e.g. Internet access points, internal corporate network) and identify any areas that are excluded from the PCI DSS Sky cardholder data environment; - maintain and provide on request details of any gap analysis that has been produced either internally or by a PCI DSS Qualified Security Advisor (QSA). This shall include details of the most recent Self-Assessment Questionnaire or Report on Compliance; - maintain and provide on request results of the most recent mandatory compliance or vulnerability scans as required by the PCI DSS; - maintain and provide on request details around any compensating controls to achieve risk mitigation in areas which do not meet the PCI DSS requirements; and - inform Sky immediately on any changes affecting the Supplier’s compliance status. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 13 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 4 Suppliers Responsibilities and Subcontractor Management (including Cloud services) 4.1 The Supplier shall have in place a dedicated in-house security risk management function or nominate an appropriate member of the Supplier personnel to take ownership of the control areas. A nominated individual shall act as the point of contact for Sky, ensure adherence to the escalation process, facilitate any review meetings and manage any remediation and restoration plan in the event of any breach. 4.2 The Supplier shall maintain a register of the security risks related to the provision of its Services to Sky, to Sky Data and to Sky Materials. That register shall be maintained to show the nature and extent of, and progress made in, mitigating the identified risks. 4.3 The Supplier shall notify Sky, and obtain Sky approval, before engaging any subcontractors including but not limited to data centres used in the provision of the Services to Sky. 4.4 The Supplier shall provide full details of any Subcontractor(s) that as a minimum shall include company name, address, location, type of services to be provided and the volume, frequency and nature of Sky Data to be used. 4.5 The Supplier shall: - not process or otherwise make use of Sky Data, and/or Sky Materials for any purpose other than that which is directly required for the supply of the Services; - only perform such Services in accordance with the Agreement; - not purport to sell, let for hire, assign rights in or otherwise dispose of any of Sky Data or Sky Materials; - not make Sky Data or Sky Materials available to any third party without the prior approval of Sky; and - not commercially exploit Sky Data or Sky Materials unless expressly approved by Sky. 4.6 The Supplier shall establish and at all times maintain safeguards against the destruction, loss or alteration of Sky Data and Sky Material in the possession of the Supplier. 4.7 The Supplier shall ensure that it maintains written agreements with all Subcontractors that contain security controls, service definitions and delivery levels commensurate with the requirements set out in this document, and such are implemented, operated, and maintained by the Subcontractor(s) at all times and in any event the Supplier must ensure that such controls, definitions and levels are in place before: - any data is processed by the Subcontractor; and 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 14 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 4.8 the Subcontractor commences the provision of services to Sky or the Supplier. The Supplier shall conduct annual security audits at all Subcontractors to confirm that the controls set out in this document and as noted in 4.7 above are in place and being operated by the Subcontractor and the Supplier will maintain evidence of these audits to include any security risks, recommendations and remedial actions suggested and implemented. Supplier security audits shall be conducted in accordance with this Standard and in any event before: 4.9 - any data is processed by the Subcontractor; and - the Subcontractor commences the provision of services to Sky or the Supplier. The Supplier shall provide a copy of the audit reports to Sky upon request. The Supplier shall notify Sky of any identified issues or deficiencies and the timeframes for their resolution on an on-going basis. 4.10 The Supplier shall ensure that it is not reliant on any key single individual to support Services anywhere in its supply chain. 5 Personnel Security – before employment 5.1 The Supplier shall ensure that a written policy exists for pre-employment screening and that the screening status and results of all Supplier personnel on the Sky account or with access to Sky Data or materials are fully collated, kept on record and made available to Sky for audit and compliance purposes. 5.2 The Supplier shall obtain two references prior to personnel completing training, and commencing operations to process Sky’s data. Such references may be verbal, but must be verified, fully documented and auditable. Where reasonably possible, the Supplier shall obtain at least one reference from a previous employer or academic professional. 5.3 The Supplier shall ensure that the application process and contractual process contain declarations to cover criminal convictions as per the terms of the Rehabilitation of Offenders Act 1974, pending criminal investigations or adverse financial probity judgements such as county court judgments or bankruptcy rulings. 5.4 The Supplier shall have a comprehensive disciplinary policy, code of conduct & work rules in place to protect the interests and safety of Supplier personnel and the Services. That policy, code of conduct or work rules shall clearly define breaches of security, indicating examples of what is classed as misconduct and the possible consequences of such misconducts. 5.5 The Supplier shall ensure that the application process and contractual process include requirements to obtain authorisation to cover pre or post-employment (‘Security Screening Waivers’), including authorisation for the Supplier to obtain County Court Judgment, and/or Criminal Record reports where appropriate and relevant. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 15 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 5.6 As appropriate to the job role and permitted by law, the Supplier shall ensure that a basic level criminal record check and security disclosure is conducted with Disclosure Scotland or other reputable agency (the “Criminal Record Checks”) against all Supplier personnel who process Sky’s data or materials and that these checks are completed before the personnel process Sky’s data. If the declarations or the relevant Criminal Record Check reveal adverse findings then the Supplier shall comply with Sky’s ‘CRC non-acceptance criteria guidelines’ (provided by Sky to the Supplier from time to time and incorporated into the Agreement by reference) and outlined at Appendix 2 and shall in every case bring this to Sky’s attention for consultation. 5.7 Where the Supplier’s business function includes financial payment transactions, the Supplier shall ensure that a financial probity check (including checks for adverse County Court Judgments and bankruptcy rulings) is conducted with Experian or other reputable agency (the “Financial Probity Check”) against all Supplier personnel who process Sky Data. If the declarations or the relevant Financial Probity Check reveal any adverse County Court Judgments or bankruptcy rulings then the Supplier shall comply with Sky’s ‘financial probity non-acceptance criteria guidelines’ as provided by Sky to the Supplier from time to time and outlined at Appendix 3. 5.8 Where appropriate to the nature and classification of data handled by the Supplier and as agreed with Sky, the Supplier shall ensure that all Background Checks (which shall mean reference check, if appropriate to the job role and permitted by law, criminal record checks and, if applicable, the Financial Probity Check) shall be conducted at the Supplier’s cost and within a reasonable time period and in any event shall be completed prior to such Supplier personnel commencing provision of the Services (excluding training). The Supplier shall bear all training and attrition costs if any Supplier personnel are removed from the Services as a result of an adverse finding on any declaration or Background Check. 5.9 The Supplier shall ensure that all personnel sign a non-disclosure agreement relating to Sky Data and Sky Materials in the possession of the Supplier. 5.10 The Supplier shall ensure that all personnel enter into a written contract of employment under which they agree to adhere to all company policies, rules/procedures, including all data protection policies, and agree to assign all intellectual property created in the course of providing the Services. 5.11 6 The Supplier shall ensure that a Security module forms part of the compulsory induction and training programme sufficient to include data protection, acceptable use policy, issues of confidentiality and company standards. Personnel Security – during employment 6.1 Where appropriate to the nature and classification of data handled by the Supplier and as agreed with Sky, the Supplier shall conduct a sample of random Background Checks on existing personnel on an annual basis. 6.2 The Supplier shall review requirements on a regular basis with respect to security 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 16 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 awareness and knowledge of fraud and security issues with Supplier personnel and its pre-approved Subcontractors throughout the provision of the Services. 6.3 The Supplier shall ensure that all personnel who process Sky Data have the appropriate qualifications, skills and training to support the Services. 6.4 The Supplier shall consult Sky Group Security on a timely basis where personnel are subject to a change of circumstance and assessed to be a risk to the Services, Sky Data or Sky Materials. 7 7.1 8 Personnel Security - termination of employment The Supplier shall carry out a ‘check list’ of actions, including exit interview, prior to the conclusion of the departing personnel’s employment/assignment. This checklist of actions shall also cover cancellation of access control privileges, user ID's/passwords and all other entitlements required for access to the Supplier and Sky Systems and recovery of any asset(s) that may contain Sky Data and Sky Materials. Facilities and Equipment Security 8.1 The Supplier shall provide and maintain suitable accommodation, facilities, equipment, space, furnishing, utilities and fixtures necessary to provide secure physical premises that provide a safe working environment to provide the Services to Sky and which adequately protect against loss or damage to the premises or to the equipment. 8.2 The Supplier shall protect power and telecommunications infrastructure carrying data or supporting information services from interception or damage. 8.3 The Supplier shall implement uninterruptible power supplies (“UPS”) for critical infrastructure and shall test the UPS regularly. 8.4 The Supplier shall ensure that all power supplies and fire safety mechanisms undergo regular maintenance checks and that facilities comply with appropriate health and safety standards. 8.5 Where Sky Data or Sky Materials are stored or processed, the Supplier shall provide sufficient secure storage space for personnel to store those personal effects that are capable of capturing and storing Sky Data and shall ensure that personnel utilise such storage space. 8.6 The Supplier shall ensure that prominent security signage or information in suitable electronic form detailing security policies and requirements are provided and displayed in all relevant locations where Sky Data is processed. 8.7 The Supplier will not perform the Services from alternate sites, without obtaining the prior written consent of Sky, and any processing at alternate sites will be approved by, and implemented at no additional cost to, Sky (unless any relocation is due to a specific request from Sky) and as far as reasonably practicable without causing any material 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 17 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 disruption to the business of Sky or the Services. 8.8 Where Sky agrees to a shared Site, the Supplier shall: 9 - as a minimum, segregate or ‘ring-fence’ the area in which the Services take place for Sky or advise Sky in advance if this is not possible and obtain agreement to the site security being implemented; and - ensure that the Services and facilities required to provide the Services to Sky permit Sky’s data to be separately identified from the Supplier’s other customers. Physical Security 9.1 The Supplier shall implement a policy identifying the requirements for physical access and control of such access at its Sites. 9.2 Where an automated access control system is deployed, the Supplier shall ensure that the system captures and records all access control events and that this record is reviewed on an appropriate on-going basis. In the event that an automated access control system is not able to check and verify all access enabled is using employee ID passes, and is not able to prevent tailgating, the Supplier shall deploy a physical security function, or other mitigating control, to enforce compliance in this area. 9.3 The Supplier shall ensure that all Supplier personnel are individually identifiable and issued with unique ID passes, which shall then be worn and visible at all times unless alternative arrangements have been agreed in advance with Sky. 9.4 The Supplier shall be responsible for retrieving the identification cards of any Supplier personnel that have had their assignment/employment terminated, transferred or where those personnel otherwise no longer require access to the Site. 9.5 The Supplier shall ensure that an appropriate policy is in place to manage loss of ID cards and ID cards not available for use at a specific location by Supplier personnel. 9.6 The Supplier shall operate a sign-in procedure for any visitors to the Sites, which, as a minimum, requires visitors to prove their identity, log their name, company, the time and date and the name of the person whom they are visiting at the relevant Sites. 9.7 Without prejudice to any of Sky’s remedies, sanctions for breaches of security requirements shall be governed by the Supplier’s disciplinary policy. 9.8 The Supplier shall deny entry to visitors to the Sites who are not legitimately connected with the Services being performed unless they are duly authorised to do so by the appropriate management. 9.9 The Supplier shall inform all visitors of the existence of Site security policies. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 18 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 9.10 The Supplier shall ensure that there is a manned guarding or other physical security presence during hours of operation to Sites which are processing or storing Sensitive Sky Data unless alternative arrangements have been agreed in advance with Sky in writing. 9.11 The Supplier shall ensure that there is a physical security response capability during out of hours periods for those Sites storing or processing Sky Data. 9.12 The Supplier shall ensure security response personnel are instructed to take action as appropriate or escalate the incident to a manager. 9.13 The Supplier shall have in place an internal and external CCTV system with sufficient coverage to monitor reception areas, exit/entry points, and vulnerable or sensitive/confidential working areas. 9.14 The Supplier shall implement, operate, support, and maintain alarm systems (including appropriate environmental alarms), and access mechanisms. 9.15 The Supplier shall ensure a clear desk policy is operated and maintained within the Sites where Sky Data is stored or processed. 9.16 When using data centre rackspace, the Supplier shall have the ability to identify Sky rackspace and equipment used in the provision of the Services as well as implement appropriate access controls to the equipment used in the provision of the Services. 9.17 With the exception of key Supplier personnel, the Supplier shall ensure that no mobile devices are taken into the operations area. 10 10.1 Incident Response The Supplier shall at all times maintain a security incident response procedure. 10.2 In the provision of Services to Sky and as part of the security incident response procedure, if the Supplier becomes or is made aware of any contravention of privacy or security requirements relating to the data, or of unauthorised access to the Systems, Sky Data, Sky Materials or any Sky Systems including the Sky Network, the Supplier shall: - immediately report the incident to Sky Group Security (investigations@bskyb.com) and to the business relationship owner; - promptly provide Sky with a written report setting out the details of the contravention of the data security requirements and describing any Sky Data, Sky Materials and/or Sky Systems which have or may have been compromised; - provide Sky, at no additional cost, with all assistance required to restore the Sky Data and any other assistance that may be required by Sky - preserve evidence to include collection, retention and presentation to Sky Group Security; 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 19 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 - return to Sky any Sky Data and/or Sky Materials; - comply with all reasonable directions of Sky; and - take immediate remedial action to secure the Sky Data , Sky Materials and /or Sky Systems and to prevent reoccurrences of the same or similar contravention and provide Sky with details of such remedial action. 10.3 If either a criminal situation or a breach of security rules occurs involving personnel providing Services to Sky and such criminal situation or breach of security becomes known to the Supplier, Sky must be notified as soon as practicable of the facts surrounding the same. 11 Business Continuity Management 11.1 The Supplier shall identify the activities and processes that support Sky Services and conduct a risk assessment of potential interruptions and identify their likely consequences. 11.2 The Supplier shall develop a business continuity plan to restore business operations following an interruption or failure to business processes (“Business Continuity Plan”) within a time period agreed to be acceptable by Sky. 11.3 The Business Continuity Plan shall include arrangements to inform and engage appropriate Sky personnel in its execution. 11.4 The Supplier shall test the Business Continuity Plan at least annually, unless otherwise agreed in advance by Sky. 11.5 The Supplier shall at least annually review and update, as necessary, the Business Continuity Plan. 12 Network Security 12.1 The Supplier shall maintain the confidential nature and integrity of Sky Data and Sky Materials and the consistency of the Supplier and the Systems and data isolation needs by: - utilising secure network architecture and operations; - ensuring that networks carrying Sky Data are designed, built, monitored, and managed according to industry standards, best practices and frameworks such as, but not limited to, ISO27001, TOGAF, OWASP ITIL., such that they enforce the required information security policy boundaries; - boundaries must prevent unauthorised access to Systems and Sky Data by default and allow only explicitly authorised and authenticated access; 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 20 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 12.2 12.3 - restricting and monitoring the use of tools and utility programs capable of overriding Systems; - utilising and maintaining appropriate firewall and security screening technology that is designed to: o prevent unauthorised access to the Supplier and Sky Systems by prohibiting all access by default and explicitly allowing authorised access; and o appropriately limit access to Sky Data and Sky Material processed by the Supplier Systems. The Supplier shall ensure that anti-virus and firewall protection systems are implemented in relation to both internal and external traffic and ensure that: - firewall platforms are hardened; - firewalls have real-time logging and alerting capabilities; - intrusion detection systems are implemented where Internet connections exist; and - access lists are implemented on network routers to restrict access to sensitive internal networks or servers. Remote support access shall be controlled via a secure gateway that implements the following controls: - two factor authentication (e.g. security tokens) combined with a valid, unique, user account which ensures personal accountability; - access via a secure gateway (e.g. a firewall); - remote support accounts only enabled for the duration of troubleshooting activity; and - all activity is logged and reviewed. 12.4 The Supplier shall provide evidence that any third party remote support of Supplier systems is authorised, governed by a contract detailing security requirements, including logging of activity and that access is given with the minimum required privileges and revoked on completion. 12.5 The Supplier shall have in place an internet, email and acceptable use policy and shall ensure that appropriate controls are in place and documented to prevent unauthorised access or download of software or web content by Supplier personnel. 12.6 The Supplier shall ensure that utility programs capable of overriding system and application controls shall be restricted and tightly controlled. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 21 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 12.7 The Supplier shall provide evidence on request by Sky of a chosen intrusion detection strategy (“IDS”), what methods are employed, whether these are recognised IDSs or whether there is a reliance on other controls in place (firewalls, network router/switch protection) and whether the function is outsourced. 12.8 The Supplier shall ensure that regular penetration testing exists as part of a vulnerability strategy and shall agree the scope of penetration testing for the Services with Sky. Further, the Supplier shall notify Sky of the results of testing and take action on the recommendations in timescales commensurate with the associated risks. 13 Protection against Malicious Code 13.1 The Supplier shall install and maintain operational anti-virus protection software on all relevant Supplier systems. The Supplier and its Subcontractor(s) shall use all reasonable endeavours to detect hidden code or data that is designed to, or may have the effect of: - destroying, altering, intercepting, withholding, corrupting or facilitating the theft of, any Sky Data or Sky Material; - disabling or locking software or systems; or - using undocumented or unauthorised access methods for gaining access to Sky Data, Sky Material or the Systems. 13.2 The Supplier shall ensure that anti-virus software and anti-virus definition files are updated for all Supplier Systems that receive, hold, process or send Sky Data in accordance with the relevant vendor’s guidelines and on a timely basis. 13.3 The Supplier shall promptly notify Sky as soon as it becomes aware of viruses in the Systems, directly affecting Sky Data, and provide a report to Sky describing any incident and what measures were taken to prevent any reoccurrence. 14 14.1 Platform and Application Security The Supplier shall ensure that: - platforms and infrastructure used to receive, store, process or send Sky Data are built using consistent and formally documented platform build standards; - all unnecessary services are removed or disabled from platforms in accordance with the vendors’ recommendations and active settings and software are security hardened; - development, testing, production and operational facilities are separated both physically and logically to reduce the risks of unauthorised access or changes to the operational system; - duties and responsibilities are segregated to reduce opportunities for 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 22 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 unintentional or unauthorised modification or misuse of Sky Data; - applicable policies and procedures are enforced to protect Sky Data associated with the interconnection of Supplier and Sky Systems; - appropriate patch management procedures are in place to remain current with platform security fixes, and conduct adequate testing; - all software installed on platforms used to receive, store or process Sky Data is authorised and fully licensed; and - where cryptographic controls are implemented, they are securely managed using documented policy procedures, keys are subject to appropriate management and key changes are made under dual control. 14.2 Where financial transactional functionality is (or becomes) a part of the Services, the Supplier shall provide data masking functionality in relation to bespoke software in respect of any financial data (including but not limited to debit/credit card and direct debit banking information) which Supplier handles for, or on behalf of, Sky. 14.3 This section is applicable only where the Supplier is providing application development and/or service provision - The Supplier must document and implement a formal and secure process for software development and/or the acquisition of software and systems receiving, storing, processing or sending Sky Data, whether in-house or through one of its Subcontractors; - The Supplier shall define, document and maintain, and make available to Sky upon request, technical security standards (including secure build configuration) for applications and systems used for receiving, storing, processing or sending Sky Data. New systems and applications must comply with this Standard (as updated from time to time and notified to Supplier); - The Supplier shall ensure that change control procedures are agreed and documented as regards the development of or implementation of or operation of bespoke systems used for receiving, storing, processing or sending Sky Data and that such documented procedures require that detail as to why the change was required and how and when the changes were executed are recorded and also include an emergency change process; - The Supplier shall ensure that all new application developments, changes to existing systems, upgrades, and new software in relation to the Services have considered security control requirements, based upon the identified risks, and that all deliverables are tested and subject to an appropriate level of vulnerability scanning prior to being released to Sky, or being used as part of the Services; - The Supplier shall ensure that application development is done in accordance with generally accepted good practice and that appropriate code review and validation controls are operated; 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 23 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 15 15.1 15.2 - The Supplier shall ensure that live Sky Data and information may not be used for test purposes without the explicit agreement of Sky. Data and information to be used for test purposes must otherwise be anonymised, scrambled or otherwise rendered in such a way that no live Sky Data or information can be reconstructed from that used for test purposes unless explicitly approved by Sky; - The Supplier shall ensure that access to program source code is restricted and strictly controlled; and - The Supplier shall ensure that back out procedures are documented prior to implementing any change or promoting a new piece of software. System Management The Supplier shall maintain systems security measures to guard against unauthorised access, alteration, interception, destruction, corruption of information through processing errors, system faults, loss or misuse of Sky Data. As a minimum, these measures should: - require all users of the Systems to enter a unique user identification code or number and password prior to gaining access to the Systems; - control the data which a user can access and/or amend and ensures that appropriate authorisation has been granted before processing any change; - control and track the addition and deletion of users of the Systems; - control and track user access to areas and features of the Systems; and - require the Supplier to operate controls to ensure that access to Sky Data and systems is granted at the minimum level necessary to achieve business objectives, access privileges are amended or removed when business requirements or objectives change and leavers’ accounts are removed promptly. The Supplier shall provide Sky with a record of such access from time to time where Sky reasonably requests such information. 15.3 The Supplier shall ensure that system clocks are synchronised with an agreed accurate time source. The Supplier shall ensure that logs are maintained which contain times stamped details on user activity and critical system events and which are periodically reviewed by an appropriate level of management; 15.4 The Supplier shall ensure that sufficient segregation is applied to any equipment operated by the Supplier for services offered to Sky unless explicit authorisation is given by Sky for exceptions. 15.5 The Supplier shall ensure that capacity requirements are monitored and Systems and networks are regularly reviewed so that they are scaled accordingly. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 24 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 15. 6 The Supplier shall ensure that the Services are fully resilient unless Sky has confirmed in writing that this is not required, in which case a formally documented and tested service recovery or continuity must be in place. 15.7 16 16.1 The Supplier shall ensure that any faults are logged, investigated, prioritised and rectified in timescales commensurate with the associated risks, and in accordance with any service levels agreed between the Parties, forming part of this Agreement. Data Management The Supplier shall ensure that regular backups of all Systems are performed, and the recoverability of backed up data, and its integrity, periodically tested, dependent on the frequency of data change. 16.2 The Supplier shall ensure that where backups are stored off-site they are encrypted and securely transported and a written register maintained of all backup tapes stored offsite. 16.3 The Supplier shall maintain a data retention & destruction policy to ensure that Sky Data is retained for no longer than necessary and is protected from unauthorised or unlawful processing. Where the Supplier is acting as a data processor for the Services, they must act in accordance with Sky instructions on retention and destruction. 16.4 The Supplier shall transfer/exchange Sky Data via secure channels which are encrypted using a Sky approved encryption solution. This shall be compliant with all relevant agreements, laws, and regulations. 16.5 The Supplier shall ensure that Sky Data is secure when accessed dynamically or when at rest. 16.6 Any subsequent disposal of Sky Data should be carried out in a secure manner and agreed with Sky in advance. All storage media and devices, or items of equipment containing storage media shall be checked to ensure that any Sky Data and licensed software has been removed or securely overwritten prior to disposal. 16.7 The Supplier shall ensure that information containing Sky Data is classified in terms of its value, legal requirements, sensitivity and criticality. 16.8 The Supplier shall ensure that an appropriate set of procedures for information labelling and handling is developed and implemented in accordance with the classification scheme adopted by the Supplier. 16.9 The Supplier shall ensure that any devices or media used to record, store or process Sky Data as part of the Services, including hard copy output, laptops, USB sticks, pen drives, CDs, or other media are authorised, securely handled, transported and encrypted. 16.10 The Supplier shall ensure that a policy is adopted to protect against the risks associated with using mobile computing, teleworking activities and communication facilities where 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 25 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 these are used to deliver the Services to Sky. 16.11 On termination or expiry of the Services to Sky the Supplier shall immediately discontinue the provision of the Services and deliver to Sky all deliverables (in whole or in part) as at the date of such termination unless otherwise agreed under the terms of, or in accordance with the provisions of the Agreement. 16.12 The Supplier shall, subject to the retention of records for accounting and tax purposes (as required by law or either party’s internal tax and accounting procedures), either destroy or promptly return to Sky all Sky Data and Sky Materials; and the Supplier shall, unless authorised by Sky or required by law, cease all Processing of Personally Identifiable Data in relation to any Agreements and return in a format as instructed by Sky, all copies of the Sky Data held in whatever form by the Supplier, or on its behalf, in relation to the Services. 17 User and Access Management 17.1 The Supplier shall have an established, documented, and reviewed procedure for the provision and limitation of access to the Systems, any Sky Systems, Sky Data and Sky Material to those personnel that need access to such materials or systems to perform their duties. 17.2 The Supplier shall have a password and user account policy with which Supplier personnel must comply. This will set a minimum password length of at least eight characters; the password must be alpha numeric; the password must expire at a maximum of 90 days and there should be minimum and maximum age and password reuse prevention. This shall include procedures to be followed when personnel leave their work station and a process to control and manage user accounts upon completion of employment or a change in role. 17.3 An automated system lock is to be invoked where a work station used to access or process Sky Data is left unattended for a period in excess of 15 minutes. 17.4 The Supplier shall ensure that restrictions on connection times shall be used to provide additional security for high risk applications processing Sensitive Sky Data. 17.5 The Supplier shall ensure that all platform and application user accounts are unique, justified, authorised, regularly reviewed and: - all platform accounts are granted the minimum required privileges to enable a user to perform their designated function; - significant platform activity is logged and reviewed; - access to platform audit trails is restricted and logged; - default accounts are regularly deleted or disabled where possible and suitably authorised and controlled where this is not possible; 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 26 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 18 18.1 - privileged platform accounts, e.g. root, are only used under change control procedures and not for day-to-day system operation; - where privileged account access is used, this access is logged and reviewed; - access to databases is restricted - where SQL databases are implemented, recent vulnerabilities are patched or mitigated; and - access to information systems audit tools shall be restricted and controlled to prevent any possible misuse or compromise. System Change Control The Supplier shall apply a change control process, including an assessment of security matters that may apply to any systems, and which includes appropriate testing and rectification, including notifying Sky of any upgrades or configuration changes which will impact on the security of Sky Data, including payment card data, prior to testing such change control processes. 18.2 The Supplier shall ensure that any new systems introduced into Sky’s Data environment are compliant with PCI DSS (where appropriate), the requirements of the Data Protection Act and any other relevant legal and regulatory requirements. 19 19.1 Customer Protection (where applicable to Services) The Supplier shall ensure that all Supplier personnel visiting Sky Customers are issued with unique, clearly identifiable ID passes. 19.2 The Supplier shall ensure that ID passes are visible at all times and that a policy is in place to manage loss of ID cards and ID cards left at home by Supplier personnel. 19.3 The Supplier shall track the issue and subsequent disposal of any Sky branded items that are used in the provision of the Services to Sky customers. 19.4 The Supplier shall maintain a register of lost/stolen Sky branded items. 19.5 The Supplier shall ensure that personnel do not share their unique ID/Authorised Sales Agent number with other personnel or with any third parties. 19.6 The Supplier shall provide to Sky a regular list of personnel including details of all joiners and leavers. 19.7 The Supplier shall obtain all necessary licenses or permissions required in the provision of Services to Sky (e.g. trading licence). 19.8 The Supplier shall have a policy detailing actions to be observed for No Cold Calling zones, any by-laws and any local Neighbourhood Watch schemes. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 27 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 19.9 The Supplier shall have a customer interaction incident escalation process. 19.10 The Supplier shall detail how any campaign activity and geographical deployment is controlled and shall provide full details if requested by Sky. 19.11 The Supplier shall notify the local police of any campaign activity in the area in which the Supplier is operating. 19.12 The Supplier shall have in place a procedure for dealing with vulnerable customers. 20 Notice Choice and Consent 20.1 Supplier will state if the processing of data changes from what was originally intended under the Agreement with Sky and this must be notified to Sky before any change in processing. 20.2 Supplier will provide individuals whose data is likely to be processed with an additional privacy notice, before such additional processing, that specifies how the Supplier intends further to process the data and for what specified purpose. 20.3 The processing of Sky data will be justified either: (i) (ii) through having obtained the consent of the individuals; or by another condition notified to Sky in advance of the change. 21 Subject Access Requests 21.1 Supplier Personnel are aware of how to identify a subject access request (“SAR”) and what to do when they receive a SAR. 21.2 The Supplier has the requisite functionality on all systems which will hold Sky Data and/or Sky Materials to enable the Supplier to comply with SARs on a timely basis. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 28 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 Appendix 1 – Defined Terms The following terms used herein shall have the following definitions: “Agreement” means the agreement(s) between Sky and the Supplier which incorporates this Security Standard by inclusion or reference; “Customer” means the individuals or organisations who procure Services from Sky; “Sensitive Data” has the meaning set out in the Data Protection Act 1998 or any other equivalent; “Services” means the services provided by the Supplier to Sky as set out in the Agreement; “Sites” means any location utilised by the Supplier in providing the Services including but not limited to the Supplier’s sites and any other location where Sky data or materials are stored and/or processed; “Sky Data” means any and all data owned, processed or produced by or on behalf of Sky (including data produced by Supplier in the provision of the Services); “Sky Materials” means any materials and or devices supplied by Sky to the Supplier or otherwise generated though the provision of the Services under the Agreement including but not limited to all devices, computer hardware, computer and telecoms equipment, appliances or property of any kind; “Sky Network” means any electronic communications systems operated by the Sky group, namely British Sky Broadcasting Group plc and any parent and all subsidiary undertakings from time to time or its affiliates or on their behalf; “Supplier” means organisations (and their Sky approved Subcontractors) that provide Services to Sky on a contractual basis under this Agreement; “Subcontractor” means contractor appointed by the Supplier in accordance with the Agreement to provide all or part of the Services; “Supplier Personnel” means any employee, contractor or agent (including the employees of such contractor or agent) of the Supplier engaged by the Supplier to provide the Services; “Systems” - means the information and communications technology system used by a party in performing the Services including any software, middleware, hardware, devices and peripheries. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 29 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 Appendix 2 – Sky Account Criminal Record Guide Never work on Sky Account Consider work on Sky Account Sexual offenders/on sexual offenders register Civil offences (public order) Drug related offences – supply and distribution Class A&B possession Class C drug offences (possession only) Violence/Assault/GBH/ABH Motoring offences (depending on role) Aggravated Theft/Burglary/handling stolen goods Miscellaneous criminal convictions Serious Fraud/white collar financial crime Firearms/weapon offences Harassment/stalking offences Miscellaneous petty theft offences Motoring offences (depending on role) Going equipped for stealing Blackmail Perjury Libel Obscene publication offences 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 30 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 Appendix 3 – Adverse Financial Probity Guide Disclosure Action Disclosed on Form 1. If less than £1,000 – NO ACTION (The CCJ must however be Satisfied (i.e., paid) or applicant provides proof that matter is being dealt with (e.g., paying £x per week). If not, applicant not to access Sky Customer Data until Satisfied or being dealt with. 2. If £1,000 + – obtain explanation and review. Note that CCJ and outstanding monies owed must be Satisfied or being dealt with, and nonmultiple (i.e. 2 or less). If criteria met and satisfactory explanation received – NO ACTION. If not, applicant not to access Sky Customer Data until satisfied or being dealt with. If multiple CCJs the continued appointment must be risk assessed. Not Disclosed on Form (The form used should leave the applicant in no doubt as to their requirements. A secondary level of guidance provided during induction & acknowledged by the applicant must remove any misunderstanding or ambiguity around what the applicant’s obligations are) Upon any disclosure, suspend, and investigate. Only where exceptional circumstances exist should NO ACTION be taken (e.g., it is believed the candidate had no knowledge of the court ruling). This aside the ‘Not Disclosed’ highlights a significant honesty and integrity issue and as such may not be considered suitable for appointment. If exceptional circumstances exist follow guidance above as if the candidate had ‘Disclosed on Form’. 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved Page 31 of 32 Restricted Audit, Risk Management and Compliance Sky Supplier Security Standard V2.9 Appendix 4 – Supplier Levels Data Examples (not exhaustive) Classification Tier 1 SECRET Information which if lost or wrongly disclosed could cause very serious damage to the interests of Sky, our customers, people, suppliers and • business partners CONFIDENTIAL Personal information that can be traced to individual customers. Information which if lost or wrongly disclosed could cause distress to our customers or people, or damage the interests of Sky Tier 2 • DPA Sensitive, e.g. Racial origin, political opinion, religious belief • Bank account and payment card detail • Maiden name/PIN • Individual call records (numbers called) • Content of Sky customer @sky.com email accounts • • • • Bid processes M&A projects Price Sensitive information Financial Statements (pre-release) • DPA Personally Identifiable Data • Name/Address • Email/Telephone number • Age/DoB • Contacts with Sky (engineer visits) • Websites visited • Payment method/due date/collection • Viewing PIN • IP Address • System architecture • Performance reports • Project plans • Departmental budget information • Aggregate Customer information and viewing RESTRICTED • Tier 3 Hard to trace back to individual customers but valuable to competitors Information which if lost or wrongly disclosed may cause limited negative effects for Sky PUBLIC No personally Identifiable Data held 2.9 Version Review Date March 2015 Sky Supplier Security Standard Reference Sky UK Limited – All rights reserved • Viewing card numbers • Policies and standards • Newsletters • Non attributable data • Data on public websites and social media • Forum postings • Product material – posters, flyers, adverts Page 32 of 32 Restricted