Call IT Support Email IT Support

Supplier Relationships

Defining the University’s approach to Supplier Relationships.

Policy Statement

This control procedure defines the University’s approach to supplier relationships and directly supports the following policy statement from the  information security policy:

The University’s information security requirements will be considered when establishing relationships with suppliers, to ensure that assets accessible to suppliers are protected. Supplier activity will be monitored and audited according to the value of the assets and the associated risks.


This procedure should be read and understood by any University staff involved in supplier and contract management, especially those involved in establishing and maintaining relationships with external suppliers

Control Statements


Access to University systems and information is provided to supplier/interested organisations to promote partnership working, information sharing, service provisions and support arrangements. We rely on the confidentiality, integrity and accuracy of our information therefore it is essential that when working with these parties (e.g. Suppliers, software providers, data controllers), information is secured in line with University requirements and professional best practice.

In order to achieve this, all contracts and relationships with suppliers should ensure that acceptable levels of information security are in place to protect University information. Expectations will differ depending on the nature of information being shared and any known risks to that information.  Consideration should be given to any associated risks in line with the Information Risk Management Policy and our agreed risk appetite position.


  1. Security Requirements for suppliers
  2. Responsibilities
  3. External party access to University systems
  4. Asset Managment

1. Security requirements for suppliers

In order to ensure that partners and suppliers meet the standards of information security required by the University, consideration should be given to the following information security components:

All parties who are given access to University systems, whether supplier, customers or otherwise, must agree to follow MMU information security policies or demonstrate that their own are functionally equivalent. Elements of information security requirements are documented within all budget and procurement requirements.

Significant assurance can be taken from the presence of current and suitably scoped certifications, including ISO 27001 for information security management, ISO 22301 for business continuity management, ISO 27017 or Cyber Essentials (mainly for HMG departments or providers of services to HMG) for cloud security.

Further assurance can be taken from the presence of policies and procedures related to:

Encryption – depending on the sensitivity of data consideration should be given to encryption at rest and in transit. Further advice can be obtained from the Information Security Team.

2. Responsibilities

When new supplier relationships are being established, or existing relationships are being renegotiated, data privacy and information security implications may be raised and the project owner or system/service owner must follow existing University project management processes. These processes incorporate a number of key information security requirements and completion of a privacy impact assessment. For assistance please contact the Information Security team.

If formal project processes are not being followed then it is the responsibility of the renewing contract manager to ensure information security requirements and privacy implications are being addressed. The contract manager should contact the information Security team for further assistance.

3. External party access to University systems

Where appropriate, access to MMU systems may be granted to suppliers or other interested parties in support of collaborative working. The degree to which access will be granted may vary based on specific needs but where possible access will be provided via VPN. Access controls will be suitably restricted meaning suppliers only have access to the information they need to fulfil their role.

Contracts with contractors and sub-contractors will contain appropriate non-disclosure clauses and incident management considerations should be addressed.

4. Asset Management

At the point that a relationship with a supplier is being or has been terminated, consideration needs to be given to the return of physical assets and the management of any data held by that party. This should be managed by the contract manager and the Information Asset Manager responsible for the information assets.


Failure to comply with this procedure could result in action in line with the University’s Disciplinary Procedure or Capability Procedure.

Compliance checks will be undertaken by the University’s Information Governance functions. The results of compliance checks, their risk assessment and their remediation will be managed by the Information Security Board.

Related documents

This control procedure needs to be understood in the context of the other policies and procedures constituting the University’s Information Security Management System.

Browse Information Security policies and control procedures


A review of this policy will be undertaken by the Information Security team annually or more frequently as required, and will be approved by the Information Governance Board.

IT helpline have submitted this sender to our  email spam filter, Barracuda and informed  HMRC of the phishing attempt.



Information Security