Responsible Organisation Programme

The Educate and Encourage Ecosystem

Information Security is everyone’s responsibility. Whether you’re a customer, supplier or employer, we all have a role to play in protecting valuable information and data.

A Responsible Organisation can come from many starting points. It may include customers, suppliers, partners, investors, insurers or other interested parties. With the need for greater control over information and data protection in the supply chain, organisations like you are taking this as an opportunity to stand out from the crowd. So what are the factors that set apart those Responsible Customers and Attractive Suppliers from those organisations that are behind the curve?

What are the characteristics of a Responsible Customer?

In terms of supply chain, there are a number of characteristics that would make a customer responsible when it comes to information security and privacy.

A Responsible Customer goes beyond ‘comply or die’ messaging and simple rights (or threats) to audit, and instead opts for the Educate and Encourage approach.

See our platform features in action

A tailored hands-on session based on your needs and goals

Book your demo

What are the characteristics of an Attractive Supplier?

What we are really asking here, is what would make suppliers more attractive to the customers they seek, in terms of information security?

  • An attractive supplier will have a ISMS that is certified and recognised by achieving ISO 27001:2013
  • They would be open to sharing their ISMS with customers using dynamic ‘always on’ demonstration
  • They can demonstrate their positive reputation and results with other customers
  • They will either have not suffered from adverse incident publicity (or have recovered well from it)
  • Thier customer facing staff (sales, operations, services) take the subject information and data security seriously and they promote good behaviours in their work with customers and prospects
  • They have a plan for EU GDPR before deadline
  • Is able to demonstrate its own supply chain is engaged and secure too
We’ve made more ISO 27001 progress in the last two weeks using ISMS.online than we have in the past year.
TOM WOOLRYCH
SERVICE & SUPPORT MANAGER | THE WORKFORCE DEVELOPMENT TRUST
Find out more

What do they both have in common?

There is little to no point in simply reading off information security policies and thinking that this will be enough for your organisation. These principles need to be in the soul and DNA of you, your workforce and every entity that you do business with.

Responsible customers and attractive suppliers ensure that the strategy they take to information and data security is in line with the ethos of the organisation. This not only makes it easy to live day to day, but it also increases your staff and stakeholder buy in.

  • Engaging & meaningful staff communications/awareness
  • Able to describe and demonstrate their ISMS is working
  • Privacy and security by design including PIA
  • Rewards & consequences
Trusted by companies everywhere
  • Simple and easy to use
  • Designed for ISO 27001 success
  • Saves you time and money
Book your demo
img

Streamline your workflow with our new Jira integration! Learn more here.