Table of Contents

How To Import New or Existing Relationships

Dan Sarlo Updated by Dan Sarlo

Why use the 'Import Relationship' feature?
  • The 'Import Relationship' feature helps users create a large number of relationships quickly without having to individually create them via the 'New Relationship Wizard'.
  • Not only can you create a large number of new relationships quickly, we also support the importing of existing relationships and their risk assessments.
Choosing your import template

From the 'Import Relationships' page, you are given two options when downloading an import spreadsheet.

For assistance in filling out these spreadsheets, we have provided example relationships in both of these templates for you to use as a guide as you provide your own information.

Important: Please make sure to remove the example relationships pre-provided in the template before attempting to import your relationships.

Useful terms/definitions
  • Vendor (a.k.a Third Party): The company whose product or service you are using or planning to use.
  • Third Party Contact: The account manager or representative at the third party.
  • Business Owner: The main point of contact for the third party. Is typically the buyer or requester.
  • Relationship: Companies use third parties to supply products or services that they need to function. If a business establishes an ongoing exchange with a third party, they begin a business relationship that allows for the buyer and supplier's success. 
  • Legacy Relationship: The relationships and their risk assessments were created outside of the VISO Platform. Represents an existing relationship.
  • Data Type: Data types represent the digital assets that may be shared with a third party, which have the potential to increase the risk of a relationship.
Spreadsheet file format

The first line of the spreadsheet contains the column headers. Do not modify or rearrange these.

Field Name

Field Description

Field Data Requirements

Client Username

The email of the user who will be marked as the creator of the relationship.

Required

Vendor Name

Name of the vendor for the relationship.

Required

Vendor Description

Description of the service/product the vendor is providing.

Nice to have

Vendor Website

Website URL for the vendor.

Required

Vendor Industry

Industry of the vendor - Technology, Finance, etc

Nice to have

Business Owner Email Address

Email address of the business owner for communication and assessment notifications

Required

Business Owner First Name

First name of the business owner

Required

Business Owner Last Name

Last name of the business owner

Required

Business Owner Business Unit

Business unit that the business owner belongs to. Example values - Product, Engineering, IT, InfoSec, etc

Important:

  • If you type 'Product' or 'product' as business unit they will be considered two different business units
  • One Business owner can only be associated with one Business Unit

Required

Primary Third Party Contact Email Address

Email address of the primary third party contact for communication/notifications

Important: If you enter email address of the third party contact then the First Name, Last Name fields are required

Nice to have

NOTE: Required if existing relationship import spreadsheet is used and Recertification Type is AUTOMATIC

Primary Third Party Contact First Name

First Name of the primary third party contact

Nice to have

NOTE: Required if existing relationship import spreadsheet is used and Recertification Type is AUTOMATIC

Primary Third Party Contact Last Name

Last Name of the primary third party contact

Nice to have

NOTE: Required if existing relationship import spreadsheet is used and Recertification Type is AUTOMATIC

Primary Third Party Contact Contact Phone

Phone number of the primary third party contact

Nice to have

Data Transfer

Data will pass through, or be stored or processed on equipment or systems owned or controlled by the third party.

Enter "Yes" if applicable, otherwise "No" or leave blank

Network Connection

Company's network will be connected to third party network.

Examples of connected networks include site-to-site virtual private networks (VPNs), dedicated point-to-point circuits, AWS Direct Connect or other dedicated circuits.

Enter "Yes" if applicable, otherwise "No" or leave blank

Data Storage

Company's data or equipment containing company's data be stored at the third party's facility.

Examples of data storage include a data center colocation where the third party does not have logical access or a storage facility housing data backup tapes.

Enter "Yes" if applicable, otherwise "No" or leave blank

Physical Access

Third party personnel will access company's facilities that contain computer systems or information technology resources.

Examples of on-site services include physical access to facilities which contain information technology resources, such as work areas containing computers or telco/server closets.

Enter "Yes" if applicable, otherwise "No" or leave blank

Personnel Data Access

Third party personnel require access to your company's computers, network or information resources.

Enter "Yes" if applicable, otherwise "No" or leave blank

Software/Hardware Supplier

Third party independently develops or supply computer software or hardware for use by your company or your customers.

Examples include software products or digital infrastructure components, Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS).

Enter "Yes" if applicable, otherwise "No" or leave blank

Data Type - Authentication credentials or internal encryption keys

Credentials used to secure an account or keys used to protect the most sensitive data in your organization.

e.g. Username and password combinations, API keys, TSI keys

Enter "Yes" if applicable, otherwise "No" or leave blank

Data Type - PII and additional attributable information

PII and any non-PII attributable information that together can put the customer at risk for social engineering.

e.g. Customer contact information and their spending history

Enter "Yes" if applicable, otherwise "No" or leave blank

Data Type - Sensitive PII

PII which if lost, compromised, or disclosed without authorization, could result in substantial harm or inconvenience to an individual.

e.g. Customer names, addresses or telephone number in combination with their social security number or credit card numbers

Enter "Yes" if applicable, otherwise "No" or leave blank

Data Type - PII (Personal Identifiable Information)

Any information that permits the identity of an individual to be reasonably inferred by either direct or indirect means.

e.g. Customer names, addresses or telephone numbers NOT in combination with social security numbers or credit card numbers

Enter "Yes" if applicable, otherwise "No" or leave blank

Data Type - Employee sensitive PII (Personal Identifiable Information)

Employee PII sensitive in nature, typically requiring breach notification in the event of unauthorized disclosure or loss.

e.g. Employee names + social security numbers, employee names + bank numbers

Enter "Yes" if applicable, otherwise "No" or leave blank

Data Type - Insider Information

A non-public fact regarding the plans or condition of a publicly traded company that could provide a financial advantage when used to buy or sell shares of that or another company's securities

e.g. Acquisition plans of a publicly traded company

Enter "Yes" if applicable, otherwise "No" or leave blank

Data Type - Vulnerabilities

Undisclosed information regarding weaknesses which can be exploited by a threat actor.

e.g. Vulnerability scan reports, penetration testing reports

Enter "Yes" if applicable, otherwise "No" or leave blank

Data Type - Proprietary and confidential information

Information your organization wishes to keep confidential.

e.g. Trade secrets, business plans, customer lists and contracts

Enter "Yes" if applicable, otherwise "No" or leave blank

Data Type - Source code

Any collection of code, possibly with comments, or any fully executable description of a software system owned by your organization.

e.g. Source code of a product you produce

Enter "Yes" if applicable, otherwise "No" or leave blank

Data Type - Unrestricted information

Information in which the unauthorized disclosure, alteration or destruction of would result in little or no impact.

e.g. Published research, press releases

Enter "Yes" if applicable, otherwise "No" or leave blank

Data Type - Less sensitive confidential information

Information owned by your organization and not made publicly available in bulk but routinely shared with partners or customers.

e.g. Employee work names and contact lists

Enter "Yes" if applicable, otherwise "No" or leave blank

Data Type - Customer or partner proprietary information

Information a company wishes to keep confidential that has been entrusted to you by a third party.

e.g. Customer trade secrets, business plans, customer lists and contracts

Enter "Yes" if applicable, otherwise "No" or leave blank

Data Type - Financial reporting

Information or financial statements that are used to track, analyze and report on business income and the financial assets.

e.g. Data from a company accounting system or monetary asset management system

Enter "Yes" if applicable, otherwise "No" or leave blank

Data Type - PCI (Payment Card Industry) data

Card Holder Data (CHD) or information including unique Primary Account Numbers (PANs) that identify the issuer and the particular cardholder account.

e.g. Customer credit or debit card information

Enter "Yes" if applicable, otherwise "No" or leave blank

Data Type - Monetary Assets

Cash and cash equivalents including digital or virtual.

e.g. Cash, access directly to bank accounts or cryptocurrency wallets

Enter "Yes" if applicable, otherwise "No" or leave blank

Data Type - PHI (Protected Health Information)

Any information about an individual's health status, medical conditions, or healthcare services that can be linked to a specific individual.

Enter "Yes" if applicable, otherwise "No" or leave blank

Tag(s) - (separated by commas)

The custom Tag(s) you would like associated with this relationship. If the Tag does not exist, one will be created and added to your list of organization tags. Tags can only contain letters or numbers.

e.g. High Priority,Tier 3,Sub-Servicer,Cloud Provider

Nice to have

Legacy Relationship - Assessment Start Date

The date the risk assessment for this relationship was started.

Required if importing existing relationships

Format: mm/dd/yyyy

Legacy Relationship - Assessment Completion Date

The date the risk assessment for this relationship was completed.

Required if importing existing relationships

Format: mm/dd/yyyy

Legacy Relationship - Assessment Review Frequency

How often/when the relationship should be reassessed.

Required if importing existing relationships

Review Frequency options - Quarterly, Semiannual, Annual, Two Years, Three Years.

Legacy Relationship - Recertification Type

How your relationship will be re-certified in the future.

Important Definitions:

1) Manual - As the recertification date approaches, we'll send you reminder emails to reassess this relationship. You will need to start the recertification process yourself by starting a new assessment within the VISO Trust platform.

2) Automatic - On the recertification date, we'll automatically reach out to the third party and re-certify this relationship using existing artifacts and updated information.

3) None - We will not automatically re-certify and you will not receive reminders around re-certifying your relationship.

Required if importing existing relationships

Recertification Type options - Manual, Automatic, None

Legacy Relationship - Automatic Artifact Updates

If you would like to turn on automatic artifact updates.

1) Yes - We will track the expiration period of the artifact as determined by the type (ex. SOC 2 Type 2) and automatically follow up with the third party for a new artifact of the same type.

2) No - we will not automatically follow up with the third party if an artifact expires.

Required if importing existing relationships

Options: Yes / No

Legacy Relationship - Assessment Inherent Risk

The risk level prior to evaluating the controls the third party had in place.

Required if importing existing relationships

Risk Level options - No Context, Low, Medium, High, Extreme

Legacy Relationship - Assessment Residual Risk

The risk level after the assessment was completed for the controls in place using the information/documents provided by the third party.

Required if importing existing relationships

Risk Level options - No Context, Low, Medium, High, Extreme

Uploading your import spreadsheet

Once you have all of the required information entered in the spreadsheet, please review the below information prior to submitting your import spreadsheet on the 'Import Relationships' page to avoid any errors that may occur.

  • Do not modify the headers in the VISO import templates
  • All required fields must be filled out. Please refer the table above for more information.
  • Formulas are not supported in our import templates.
  • Do not rearrange or delete any columns.

How did we do?

Trust AI Q&A

Contact