Yazi Vendor Management Policy

1. Introduction

This Vendor Management Policy ("Policy") outlines Yazi's approach to identifying, onboarding, monitoring, and managing all vendors and third-party service providers ("Vendors") who may have access to Yazi systems, networks, or data, including client data. The Policy is designed to minimise risks associated with third-party relationships, ensure compliance with applicable regulations (such as POPIA and GDPR), and protect Yazi’s operational integrity.


2. Scope

This Policy applies to all vendors that:

  • Process or store Yazi's or client data

  • Provide critical services or infrastructure

  • Have access to Yazi's systems or networks

  • Integrate with Yazi's WhatsApp research platform

It covers the lifecycle of the vendor relationship, including selection, due diligence, onboarding, ongoing monitoring, and termination.


3. Roles and Responsibilities

  • Vendor Relationship Owner (VRO): The Yazi employee responsible for initiating the vendor engagement, coordinating due diligence, and acting as the primary liaison.

  • Legal & Compliance Team: Ensures all contractual and regulatory obligations are addressed, conducts legal review of agreements, and advises on compliance.

  • Information Security Team: Evaluates and approves the security posture of Vendors, conducts risk assessments, and manages incidents.

  • Finance Team: Reviews financial viability and ensures that negotiated terms align with Yazi’s budget and payment processes.

  • Executive Management: Approves strategic or high-risk vendor relationships, especially those handling sensitive or mission-critical operations.


4. Vendor Classification

Yazi classifies Vendors into three risk-based levels:

4.1 Level 1 (Critical)

  • Vendors with direct access to personal or confidential data

  • Integration with Yazi's core platform services (e.g., AWS, WhatsApp Business API providers)

  • High impact on business continuity if services are disrupted

  • Example: Hosting providers, payment gateways, communication APIs

4.2 Level 2 (Important)

  • Vendors who have access to some internal systems or process non-sensitive data

  • Moderate impact on Yazi’s operations

  • Example: Analytics providers, specialised software tools

4.3 Level 3 (Standard)

  • Vendors with no direct access to systems or data

  • Minimal impact on business operations

  • Example: Office supplies, cleaning services

Classification ensures that due diligence and monitoring are proportionate to the level of risk.


5. Vendor Selection & Due Diligence

5.1 Identification and Evaluation

  1. Business Need Identification: Department requesting the service identifies business objectives and requirements.

  2. Preliminary Vendor Research: A shortlisting of possible Vendors based on capabilities, market presence, and references.

  3. RFP/RFQ Process (If Required): For major or complex engagements, a formal Request for Proposal (RFP) or Request for Quotation (RFQ) may be used to compare Vendors.

5.2 Initial Assessment

All prospective Vendors undergo an evaluation to ensure they meet Yazi’s standards:

  1. Security Capabilities Evaluation: Assess the Vendor’s information security controls and policies.

  2. Regulatory Compliance Check: Confirm Vendor adherence to POPIA, GDPR, or other relevant regulations.

  3. Financial Stability Review: Request financial statements or credit references to verify sustainability.

  4. Technical Capability Assessment: Evaluate the Vendor’s infrastructure, scalability, and compatibility with Yazi’s environment.

  5. Privacy Impact Assessment: For Level 1 Vendors, a formal privacy impact assessment is required to understand data handling risks.

5.3 Documentation Requirements

Depending on the Vendor’s classification, Yazi may request:

  • Information security policies (e.g., ISO 27001 certification)

  • Data protection procedures and certifications (e.g., SOC 2, ISO 27701)

  • Compliance certifications for relevant regulations

  • Business continuity and disaster recovery plans

  • Insurance coverage documents

  • Penetration test reports or vulnerability scans (Level 1 Vendors)

All documentation is reviewed by the relevant Yazi teams to confirm appropriateness.


6. Security Requirements

6.1 Baseline Security Requirements (All Vendors)

  • Data Encryption: All Vendor-managed data for Yazi must be encrypted both in transit (TLS 1.2 or higher) and at rest.

  • Access Controls: Implement role-based access with the principle of least privilege. Access to Yazi data or systems must be granted only as necessary.

  • Incident Reporting: Provide immediate notification to Yazi (within 24 hours) of any security incident affecting Yazi data or operations.

  • Regular Security Assessments: The Vendor must conduct periodic vulnerability assessments. Yazi may request copies of summary reports.

  • Employee Screening: Vendors must have background checks or vetting procedures for personnel handling Yazi data.

6.2 Additional Requirements for Level 1 Vendors

  • Multi-Factor Authentication (MFA): Mandatory for all user accounts with access to Yazi data.

  • Regular Penetration Testing: Provide evidence of at least annual penetration tests and remediation.

  • Security Audit Reports: Submit independent audit reports (e.g., ISO 27001, SOC 2 Type II) on a regular basis.

  • Data Localisation Compliance: Where regulations demand local data storage, the Vendor must ensure data residency within specified jurisdictions.


7. Contractual Requirements

7.1 Mandatory Contract Clauses

  1. Data Protection: Outline obligations regarding personal data handling, including privacy and data protection laws (POPIA, GDPR).

  2. Confidentiality: Prohibit unauthorised disclosure of Yazi information.

  3. Security Standards Compliance: Specify baseline security controls and regular audits.

  4. Incident Reporting: Define timelines and responsibilities for reporting and resolving security or data breaches.

  5. Right to Audit: Allow Yazi or a designated third party to review the Vendor’s compliance with contract terms.

  6. Termination & Exit Clauses: Establish conditions for termination and how data will be returned or destroyed.

  7. Liability & Indemnification: Clarify financial responsibility in the event of data breaches or non-compliance.

7.2 Contract Approval Process

All Vendor agreements must be reviewed and approved by:

  • Legal & Compliance: Ensures all legal, regulatory, and risk provisions are covered.

  • Information Security: Confirms alignment with security requirements.

  • Finance: Reviews financial terms and budgets.

  • Executive Management: Provides final sign-off for Level 1 Vendors or high-value contracts.


8. Monitoring and Review

8.1 Ongoing Performance Monitoring

  • Service Level Monitoring: The Vendor Relationship Owner tracks performance metrics (uptime, response times) monthly.

  • Periodic Review Meetings: Depending on the Vendor’s classification, quarterly or biannual check-ins are held to discuss service quality and any issues.

  • Risk Assessments: The Information Security Team may require Vendors to complete annual security questionnaires.

  • Compliance Checks: Vendors handling personal data may need to provide updated privacy statements or compliance reports.

8.2 Documentation

All reviews and assessments must be documented:

  • Assessment Results & Follow-up Actions

  • Compliance & Security Reports

  • Performance Metrics

  • Incident Reports

These records are maintained by the Vendor Relationship Owner in a central repository and are accessible for audit.


9. Access Control

For Vendors requiring system or data access:

  1. Unique Credentials: Each Vendor user must have a unique ID; shared accounts are prohibited.

  2. Role-Based Access: Access is granted based on job function and is periodically reviewed.

  3. Access Reviews: Departments must review and confirm active Vendor accounts on at least a quarterly basis.

  4. Prompt Termination: Access must be revoked immediately upon the completion of a project or change in Vendor personnel.

  5. Logging and Monitoring: Activities by Vendor accounts are logged; suspicious activity triggers an investigation.


10. Data Protection

When Vendors process Yazi or client data:

  1. Data Minimisation: Vendors should only collect and process the minimum amount of data necessary.

  2. Purpose Limitation: Data must be used solely for the contracted service.

  3. Storage & Retention: Data must be stored securely and retained only as long as necessary or legally required.

  4. Cross-Border Transfers: Any transfer of data across borders must comply with POPIA, GDPR, or local requirements.

  5. Encryption & Secure Disposal: Ensure encryption at rest, and securely destroy data after contract termination.


11. Incident Management

11.1 Vendor Obligations

  • Immediate Notification: Vendors must inform Yazi within 24 hours of discovering a breach that may affect Yazi data.

  • Collaboration: Provide complete cooperation during incident investigations and disclose relevant findings.

  • Root Cause Analysis & Remediation: Vendors must identify the issue, implement fixes, and prevent recurrence.

  • Client Notification Support: Where required by law or contract, Vendors must support Yazi in notifying affected clients.

11.2 Post-Incident Review

A post-incident review meeting may be held to evaluate response effectiveness and update any security or process gaps.


12. Business Continuity

12.1 Vendor Responsibilities

  • Continuity & Recovery Plans: Vendors must maintain documented plans for business continuity, disaster recovery, and workforce continuity.

  • Regular Testing: Plans must be tested at least annually.

  • Recovery Objectives: Clearly define recovery time and recovery point objectives (RTO/RPO) for critical services.

  • Backup Procedures: Data backups must be performed regularly and stored securely.

  • Alternative Arrangements: In case of an extended disruption, Vendors must have contingency options to continue critical services.


13. Vendor Termination

13.1 Exit Management

  • Notice Period: Observe contractually required notice.

  • Data Return/Destruction: Ensure all Yazi or client data is returned or securely destroyed.

  • System Access Removal: Revoke access rights promptly.

  • Knowledge Transfer: Where needed, Vendors must assist in transferring knowledge to new providers or Yazi teams.

  • Final Security Audit: May be performed to confirm that data has been appropriately disposed of.

13.2 Documentation

A formal termination report should record:

  • Reason for termination

  • Completed exit tasks

  • Lessons learned


14. Compliance Monitoring

14.1 Audits

Yazi reserves the right to audit Vendors for compliance with contractual and regulatory obligations, particularly if the Vendor handles Level 1 or Level 2 data.

14.2 Remediation

If audit findings reveal non-compliance or security gaps, the Vendor must provide a remediation plan and timeline.


15. Policy Governance

15.1 Review & Updates

  • Annual Review: This Policy is reviewed annually by Yazi’s Legal & Compliance and Information Security teams.

  • Continuous Improvement: Feedback from incidents, audits, or lessons learned is incorporated as needed.

  • Change Management: Major changes must be approved by Executive Management.

  • Stakeholder Communication: Updated versions are communicated to relevant internal and external stakeholders.

  • Training Requirements: Yazi employees involved in vendor management must complete periodic training on Policy requirements.

15.2 Documentation Requirements

Mandatory records:

  • Vendor agreements and addendums

  • Security assessments, questionnaires, and audit reports

  • Performance reports and SLAs

  • Incident logs

  • Access records and termination proofs

Last updated