Third-Party Risk Management
Document Control
| Item | Detail |
|---|---|
| No. Dokumen | POL-LEG-012 |
| Versi | 2.1 |
| Berlaku sejak | 20 Februari 2026 |
| Review berikutnya | 20 Februari 2027 |
| Pemilik Dokumen | HR Department |
| Disetujui oleh | Chief People Officer |
Riwayat Revisi
| Versi | Tanggal | Penulis | Perubahan |
|---|---|---|---|
| 1.0 | 20 Februari 2026 | HR Team | Dokumen awal - standarisasi format |
| 2.0 | 20 Februari 2026 | AI Audit System | Standardisasi Document Control section |
| 2.1 | 21 Februari 2026 | AI Audit System | Perbaikan nilai CIRCCA sesuai standar perusahaan |
Third-Party Risk Management
Merujuk pada ISO 27001:2022 Annex A.15 (Supplier Relationships), ISO 9001:2015 Section 8.4 (External Providers), NIST Cybersecurity Framework, ISO 27002:2022 Section 6.6 & 6.7
Versi: 2.1 | Berlaku sejak: Februari 2026 | Review berikutnya: Februari 2027 | Pemilik: Operations + Legal
Filosofi CIRCCA
Manajemen Risiko Pihak Ketiga kami didasarkan pada nilai-nilai inti CIRCCA:
- Curiosity: Proaktif mengidentifikasi dan mengevaluasi risiko dari setiap hubungan pihak ketiga
- Impact: Pengelolaan risiko pihak ketiga yang efektif melindungi operasional dan reputasi perusahaan
- Respect: Menghormati standar keamanan dan privasi dalam setiap kerjasama eksternal
- Courage: Berani menghentikan kerjasama dengan pihak ketiga yang tidak memenuhi standar
- Commitment: Komitmen pada due diligence yang menyeluruh untuk setiap vendor dan partner
- Adaptability: Responsif terhadap perubahan profil risiko dan evolusi ancaman dari pihak ketiga
Ruang Lingkup
| Aspek | Keterangan |
|---|---|
| Berlaku untuk | Semua vendor, supplier, partner, subkontraktor, dan external service providers yang bekerja dengan Divistant |
| Cakupan | Vendor IT (cloud, hosting, security), vendor operasional (office, equipment), vendor layanan (consulting, outsourcing), dan partner bisnis |
| Pihak terkait | Procurement/Operations, Legal & Compliance, IT Security, Finance, Department Heads, Vendor Management |
Definisi Istilah
| Istilah | Definisi |
|---|---|
| Vendor | Pihak ketiga yang menyediakan barang atau jasa kepada Divistant dalam transaksi komersial |
| Supplier | Subset dari vendor yang menyediakan raw materials atau components untuk operasi bisnis |
| Partner | Pihak ketiga yang memiliki hubungan jangka panjang atau strategis dengan Divistant (reseller, integrator, technology partner) |
| Subkontraktor | Vendor yang dipilih dan dikelola oleh vendor lain untuk melaksanakan bagian dari pekerjaan/layanan |
| Critical Vendor | Vendor yang layanannya essential untuk operasi bisnis, atau handle sensitive data/system, atau memberikan unique value |
| Risk Assessment | Proses evaluasi kemungkinan dan dampak dari risiko yang terkait dengan vendor |
| Due Diligence | Investigasi menyeluruh mengenai vendor sebelum engagement atau signing kontrak |
| Service Level Agreement (SLA) | Perjanjian tertulis mengenai standar layanan, responsiveness, dan remedies jika tidak memenuhi standar |
| Data Processing Agreement (DPA) | Kontrak khusus untuk vendor yang memproses data pribadi, dengan terms perlindungan data |
Pernyataan Kebijakan
Divistant bergantung pada vendor dan partner untuk mendukung operasi bisnis dan memberikan value kepada klien. Kami percaya bahwa manajemen risiko vendor yang efektif adalah kritikal untuk memastikan continuity, security, dan compliance. Oleh karena itu, Divistant mengimplementasikan framework komprehensif untuk assessment, selection, monitoring, dan management vendor.
Setiap vendor harus melalui due diligence sebelum engagement, signed contract yang jelas dengan terms yang melindungi Divistant dan klien kami, dan dimonitor secara reguler untuk ensure compliance dan performance. Kegagalan vendor yang significant dapat mengakibatkan contract termination dan, jika ada damage, legal action untuk recovery.
Kategori Risiko Vendor
1. Security & Privacy Risks
Deskripsi: Vendor menangani data sensitif atau sistem kritikal yang jika compromised dapat expose Divistant atau klien kami pada security breach.
Contoh Vendor:
- Cloud service providers (AWS, Azure, Google Cloud)
- Email & communication vendors (Gmail for Business, Microsoft 365)
- Password management & identity management systems
- Cybersecurity vendors (antivirus, firewall, SIEM)
- Data center & hosting providers
Risiko Spesifik:
- Data breach karena weak security practices
- Unauthorized access ke data pribadi klien atau karyawan
- Ransomware attacks yang menyebabkan downtime
- Insufficient encryption atau secure deletion
- Inadequate access controls dan authentication
- Insider threats dan employee misconduct
Mitigasi Requirements:
- ISO 27001 certification (atau equivalent)
- SOC 2 Type II audit report
- Data Processing Agreement (DPA) dengan standard clauses
- Encryption at rest dan in transit
- Multi-factor authentication untuk administrative access
- Regular security audits dan penetration testing
- Incident response plan dan notification procedures
- Compliance dengan relevant regulations (GDPR, UU PDP 27/2022)
2. Operational Risks
Deskripsi: Vendor service yang disrupted dapat menyebabkan business interruption, missed deadlines, atau service degradation kepada klien.
Contoh Vendor:
- Internet service providers (ISP)
- Cloud computing providers
- Outsourced development atau support teams
- Office supplies dan equipment providers
- Logistics & courier services
Risiko Spesifik:
- Service downtime karena technical issues atau poor infrastructure
- Delayed delivery atau missed deadlines
- Quality issues dalam deliverables
- Inadequate disaster recovery dan business continuity planning
- Staff turnover causing loss of critical knowledge
- Vendor financial distress leading to service cessation
Mitigasi Requirements:
- Service Level Agreements (SLA) dengan clear uptime targets (e.g., 99.5% untuk mission-critical)
- Performance metrics dan monitoring dashboards
- Regular status reporting dan escalation procedures
- Business continuity & disaster recovery plan dengan tested RTO/RPO
- Financial stability assessment (credit check, financial statements review)
- Change management procedures dengan notification
- Redundancy atau backup vendors untuk critical services
3. Compliance & Regulatory Risks
Deskripsi: Vendor non-compliance dengan regulations dapat menyebabkan Divistant dan klien kami terkena legal penalties, fines, atau reputational damage.
Contoh Vendor:
- Data processors (cloud, email, CRM)
- Financial service vendors (payment processors, accounting software)
- HR software providers
- International vendors (compliance dengan export control)
- Vendor yang handle klien data sensitive
Risiko Spesifik:
- Non-compliance dengan data protection regulations (GDPR, UU PDP, CCPA)
- Violation of export control atau sanctions compliance
- Non-compliance dengan industry-specific regulations (finance, healthcare)
- Tax compliance issues atau incorrect invoicing
- Employment law violations oleh vendor staff
- Environmental atau labor law violations
Mitigasi Requirements:
- Certification atau compliance attestations relevant to industry
- Compliance questionnaires dengan specific regulatory requirements
- Data Processing Agreement (DPA) dengan required terms
- Audit rights dan access untuk compliance verification
- Regular compliance audits oleh internal team atau third-party
- Representations & warranties dalam contract mengenai compliance
- Indemnification clause untuk compliance violations
4. Financial & Commercial Risks
Deskripsi: Vendor financial atau commercial issues dapat menyebabkan hidden costs, contract disputes, atau unfavorable terms.
Contoh Vendor:
- Software licensing vendors
- Hardware & equipment suppliers
- Outsourced service providers (development, support)
- Professional services vendors (consulting, audit)
Risiko Spesifik:
- Hidden costs atau unexpected price increases
- Vendor insolvency atau bankruptcy
- Unfavorable contract terms atau lock-in situations
- Dependency pada single vendor dengan limited alternatives
- Intellectual property disputes atau IP ownership issues
- Inadequate insurance atau liability limitations
Mitigasi Requirements:
- Clear pricing dengan price escalation terms
- Financial stability assessment (credit check, Dun & Bradstreet rating)
- Contract dengan favorable IP terms, liability, dan indemnification
- Price comparison dengan market rates
- Avoid single-vendor dependency untuk critical functions
- Insurance requirements dalam contract
- Payment terms yang protect Divistant (e.g., milestone-based)
5. Reputational & Stakeholder Risks
Deskripsi: Vendor yang memiliki poor reputation, ethical issues, atau involvement dalam controversial activities dapat damage Divistant's reputation.
Contoh Vendor:
- Vendors dengan history of data breach atau scandal
- Vendors involved dalam controversial industries atau practices
- Vendors dengan poor labor practices atau environmental record
- Vendors dengan public complaints atau legal issues
Risiko Spesifik:
- Association dengan vendor controversial dapat damage Divistant's brand
- Public backlash jika klien mengetahui vendor kami memiliki issues
- Media coverage tentang vendor scandals melibatkan Divistant
- Klien concerns tentang ethical compatibility dengan vendor
Mitigasi Requirements:
- Background check dan reputation assessment
- Review media coverage dan customer reviews
- Vendor compliance dengan sustainability atau ethics standards
- Contractual terms requiring ethical conduct dan compliance
- Public communication strategy jika issues arise
Proses Assessment & Due Diligence Vendor
Phase 1: Vendor Identification & Initial Screening
| Langkah | Aktivitas | Owner | Waktu |
|---|---|---|---|
| 1. Identify Need | Departemen menentukan requirements untuk vendor/service | Requester | Day 1 |
| 2. Search & Shortlist | Procurement mencari potential vendors, create shortlist | Procurement | Day 3-7 |
| 3. Initial Screening | Check basic criteria (location, size, experience, availability) | Procurement | Day 7 |
| 4. Risk Categorization | Tentukan risk category (Critical/High/Medium/Low) berdasarkan nature of services | Procurement + Legal | Day 8 |
Phase 2: Due Diligence Assessment
Due diligence requirements bergantung pada risk category:
CRITICAL VENDORS (e.g., cloud provider, security vendor, data processor):
| Assessment Item | Requirement | Method |
|---|---|---|
| Company Background | Company registration, ownership, financial stability | UPDATER registration check, Dun & Bradstreet, credit agency |
| Security Certifications | ISO 27001, SOC 2 Type II | Obtain certificates atau audit reports |
| Compliance | GDPR/CCPA compliance, data processing capability | DPA review, privacy policy audit |
| Financial Health | Revenue, profitability, debt levels | Financial statements review (2-3 years) |
| Insurance | E&O insurance, cyber insurance | Certificate of Insurance |
| Reputation & References | Customer reviews, case studies, references | Online research, reference checks (min 3) |
| Security Practices | Encryption, access controls, incident response | Security questionnaire, SOC 2 review |
| Subcontractors | List of subcontractors dan risk assessment | Subcontractor assessment |
| Legal/Regulatory | Litigation history, regulatory issues | Court records, regulatory agency checks |
HIGH RISK VENDORS (e.g., outsourced support, financial vendor):
| Assessment Item | Requirement |
|---|---|
| Company Background | Basic company info, financial stability check |
| Relevant Certifications | Industry-specific (ISO 9001, ISO 20000, etc.) |
| Compliance | Compliance with relevant regulations |
| Financial Health | Basic revenue/profitability check |
| Insurance | Relevant insurance coverage |
| References | Min 2 reference checks |
| Service Documentation | Service capabilities, process documentation |
MEDIUM/LOW RISK VENDORS (e.g., office supplies, routine services):
| Assessment Item | Requirement |
|---|---|
| Company Background | Basic company info |
| Financial Health | Quick credit check atau payment history |
| Service Capabilities | Confirm able to deliver requirements |
Phase 3: Contracting & Approval
| Langkah | Aktivitas | Owner | Checklist |
|---|---|---|---|
| 1. Draft Contract | Legal menyiapkan contract terms | Legal | [ ] Standard terms included [ ] Risk mitigations incorporated [ ] Insurance requirements [ ] Compliance requirements |
| 2. Negotiation | Procurement & Legal negotiate terms dengan vendor | Procurement + Legal | [ ] Terms acceptable to both parties [ ] All risks addressed [ ] SLA defined (if applicable) |
| 3. Sign-off | Legal, Procurement, Department Head review & approve | Legal + Procurement + Requester | [ ] All required approvals obtained [ ] Contract executed properly [ ] Both parties signed |
| 4. Implementation | Vendor onboarded, access provisioned, SLA monitoring started | Procurement + IT + Department | [ ] All setup complete [ ] Monitoring dashboards active [ ] Escalation procedures documented |
Vendor Kontrak & Terms
Mandatory Contract Clauses untuk Semua Vendor:
1. Service Scope & SLA
- Clear definition of services, deliverables, timeline
- Performance metrics dan acceptable service levels
- Escalation procedures untuk service issues
- Remedies (credits, penalties) untuk SLA breaches
2. Security & Confidentiality
- Confidentiality obligations untuk both parties
- Security requirements commensurate dengan data/system sensitivity
- Incident notification within 24-72 hours
- Right to audit security controls
3. Compliance & Data Protection
- Compliance dengan relevant laws dan regulations
- Data Processing Agreement (DPA) jika vendor memproses data pribadi
- Data subject rights (access, correction, deletion, portability)
- Cooperation dalam regulatory investigations atau audits
4. Intellectual Property
- Ownership of work product dan deliverables
- Licenses granted untuk use of vendor IP
- Protection dari third-party IP claims
5. Liability & Indemnification
- Liability caps (usually 12 months of fees)
- Exclusions of liability (indirect, consequential damages)
- Indemnification untuk third-party claims
- Insurance requirements
6. Termination
- Termination for convenience dengan notice period
- Termination for cause (breach, non-performance)
- Obligations upon termination (data return, confidentiality continuation)
- Wind-down procedures
7. Subcontractors
- Prohibition atau approval requirement untuk subcontractors
- Vendor remains responsible untuk subcontractor performance
- Subcontractors must agree to same terms
8. Change Management
- Process untuk requesting changes atau new services
- Pricing untuk additional services
- Change approval procedures
Specific Requirements untuk CRITICAL VENDORS:
Data Processing Agreement (DPA) - untuk vendor handling PII:
- Standard terms per GDPR Article 28 atau UU PDP 27/2022
- List of sub-processors
- Security measures implemented
- Data subject rights fulfillment
- Audit rights
- Data transfer limitations (if applicable)
- Data deletion atau return procedures
Business Continuity & Disaster Recovery:
- RTO (Recovery Time Objective): ≤ 4 hours untuk critical services
- RPO (Recovery Point Objective): ≤ 1 hour untuk data
- Regular testing (at least annually)
- Documented and tested backup plans
- Notification procedures untuk major incidents
Security Requirements:
- ISO 27001 certification atau equivalent
- SOC 2 Type II audit report
- Encryption at rest dan in transit
- Multi-factor authentication
- Regular security assessments (penetration testing, vulnerability scanning)
- Incident response plan
- Security breach notification
Vendor Monitoring & Performance Management
Ongoing Monitoring Framework:
| Metrik | Target | Frequency | Owner | Action if Missed |
|---|---|---|---|---|
| Uptime/Availability | 99.5% (critical), 99% (important) | Monthly | Vendor | Service credit, escalation |
| Response Time | Per SLA definition | Per incident | Vendor | Escalation, penalty |
| Security Audit | Annual SOC 2/ISO 27001 | Annually | Vendor | Re-assessment required |
| Compliance Review | Maintain compliance status | Quarterly | Legal | Remediation plan required |
| Quality Score | >90% (if applicable) | Quarterly | Department | Performance improvement plan |
| Financial Health | No deterioration | Annually | Procurement | Risk mitigation assessment |
| Communication | Regular status updates | Per contract | Vendor | Escalation |
Quarterly Business Review (QBR):
Peserta: Vendor account manager, Divistant project lead, Procurement, Legal (if critical)
Agenda:
- Performance review (uptime, SLA compliance, quality metrics)
- Outstanding issues atau complaints
- Planned changes atau new features
- Security & compliance updates
- Feedback dan improvement opportunities
- Renewal planning (if contract expiring soon)
Documentation: QBR minutes recorded dan filed untuk audit trail
Incident & Issue Management:
Severity Levels:
| Level | Definition | Initial Response | Target Resolution |
|---|---|---|---|
| Critical | Service completely unavailable, security breach, data loss | Within 1 hour | Within 4 hours |
| High | Major functionality impaired, significant performance degradation | Within 2 hours | Within 24 hours |
| Medium | Partial functionality affected, minor performance issue | Within 8 hours | Within 5 days |
| Low | Minor issue, cosmetic problem, no impact to users | Within 24 hours | Within 30 days |
Escalation Path:
- Tier 1: Vendor support team
- Tier 2: Vendor engineering team (if not resolved within 2 hours for Critical)
- Tier 3: Vendor management (if not resolved within 4 hours for Critical)
- Tier 4: Executive escalation (if SLA will be breached)
Vendor Risk Response & Remediation
Risk Response Actions:
If Performance Issues Detected:
Verbal/Email Notification (within 2 days of detection)
- Describe issue clearly
- Provide evidence/data
- Request explanation dan remediation plan
- Set deadline for response (3-5 days)
Formal Notice (if not resolved after initial notification)
- Written notice of breach atau non-performance
- Specific remediation required
- Deadline for remediation (7-14 days)
- Warning of contract termination if not resolved
Remediation Plan Review
- Vendor submits detailed remediation plan
- Divistant reviews dan approves atau requests modifications
- Regular monitoring of remediation progress
- Milestone-based verification
Contract Termination (if not remediated)
- Termination notice per contract terms
- Wind-down period dengan knowledge transfer
- Data extraction atau migration
- Final invoice settlement atau disputes
If Security/Compliance Issues Detected:
- Immediate escalation kepada Legal & IT Security
- Security incident response activation
- Third-party audit atau forensic investigation (if needed)
- Vendor notification & root cause analysis
- Remediation with strict timeline
- Potential contract termination untuk critical violations
- Notification kepada affected clients (if necessary per contract)
Training & Awareness
| Aktivitas | Frekuensi | Sasaran | Metode | Pemimpin |
|---|---|---|---|---|
| Vendor Management Basics | Saat hire | Procurement, Operations staff | Online module | Procurement |
| Due Diligence Process Training | 1x per tahun | Procurement, Legal, Department Heads | Workshop | Procurement + Legal |
| Vendor Risk Assessment | 2x per tahun | Procurement, Legal, IT Security | Training session | Legal + Procurement |
| Contract Review Standards | 1x per tahun | All staff involved dalam vendor management | Guidelines review | Legal |
| Incident Response Procedures | 2x per tahun | All departments | Scenario-based training | IT Security + Operations |
Kebijakan Terkait
- Procurement & Purchasing Policy
- Information Security Policy
- Data Protection & Privacy Policy
- Compliance & Regulatory Framework Policy
- Business Continuity & Disaster Recovery Policy
- Incident Response & Management Policy
- Subcontracting & Outsourcing Policy
- Conflict of Interest Policy (applicable to vendor selection)
Kontak
| Posisi | Nama/Tim | Phone | |
|---|---|---|---|
| Kepala Operations/Procurement | Operations Team | operations@divistant.com | +62-21-XXXX-XXXX |
| Kepala Legal & Compliance | Legal & Compliance | legal@divistant.com | +62-21-XXXX-XXXX |
| IT Security Manager | IT Security | it.security@divistant.com | +62-21-XXXX-XXXX |
| Vendor Manager | Procurement | procurement@divistant.com | +62-21-XXXX-XXXX |