• Font Size:
  • S
  • M
  • L
友善列印
WORD

Article NO. Content

Title:

Reference Guidelines on the Supply Chain Risk Management of Service Enterprises in Securities and Futures Markets  CH

Announced Date: 2023.11.13 (Articles 4, 7, 10 amended,English version coming soon)
Current English version amended on 2022.04.26 
Categories: Information Operations
Article 7     Safety Control of Information Service Supplier Agreements
  1. After an organization selects an information service supplier, the parties shall agree on and confirm the content of the agreement. The agreement shall incorporate the following:
    1. Basic contractual requirements
      1. term of the agreement
      2. scope of service
      3. delivery date of the service
      4. service standard
      5. provisions on the change of service
      6. standards for acceptance testing of the service
      7. procedures for handling an information and communication security event, including the requirement that the engaged contractor take the initiative to notify the principal promptly should such event occur
      8. clauses giving the organization rights to audit the information service supplier, including, within the scope of outsourcing,the information service supplier consents that a competent authority or the Central Bank may obtain relevant data or reports and conduct financial examinations or may order it to provide related data or reports within the prescribed time limit
      9. provisions on the assignment of the agreement or consent to subcontracting
      10. confidentiality clause
      11. penal provisions and damages clause
      12. dispute resolution procedures
      13. breach of contract clause
      14. provisions on termination, including material grounds for termination and clauses entitling a competent authority to give notice of termination or rescission in accordance with the contract
      15. consequences of termination
      16. warranty
      17. rights and responsibilities
    2. Requirements for the information service supplier’s products and services
      1. An organization shall specify expressly the intellectual property rights in the IT-outsourced service or product.
      2. An organization shall specify expressly whether subcontracting of the IT-outsourced service or product to other suppliers is permitted. If it is permitted, the information service supplier shall provide the subcontracting plan and obtain the organization’s approval before proceeding with the subcontracting.
      3. A type 1 organization shall specify expressly the requirement that security by design be incorporated into the service or product being procured during its inception. The security by design mechanism shall include, in respect of the service and product, the protection of classified information, authorization and authentication, security update, etc.
      4. A type 1 organization shall specify expressly the requirement that privacy by design be incorporated into the service or product being procured during its inception.
    3. Where the scope of service involves the development, maintenance, and monitoring of the information and communication system, an organization shall expressly require the information service supplier to comply with the Reference Guidelines on the Protection of the Information and Communication Systems of Service Enterprises in Securities and Futures Markets.
    4. Where the scope of service involves the use of the cloud computing service, an organization shall expressly require the information service supplier to comply with the Securities and Futures Market Related Association Emerging Technology Information Security Control Guidelines.
    5. Requirements for information security of the information service supplier
      1. An organization shall specify expressly the information security requirements, Personal Data Protection Act, other applicable laws and regulations, and confidentiality obligations with which the information service supplier shall comply.
      2. An organization shall specify expressly its role and responsibilities and those of the information service supplier in regard to information security within the scope of IT outsourcing.
      3. An organization shall specify expressly that the information service supplier shall provide certification of security testing such as mobile application security checks, source code analyses, vulnerability scans, etc. and shall ensure the system or program delivered is free of malicious programs and backdoors. Programs installed on the Internet shall pass code scanning or black box testing.
      4. An organization shall specify expressly that the information service supplier be required to present certification of the sources and licences of the components of third-party programs.
      5. An organization shall specify expressly that information on the scope of service outsourced by the organization as processed by the information service supplier be made available within the time limit prescribed by the organization.
      6. An organization shall specify expressly the procedures for an information service supplier to handle a change of service or information and communication security event.
      7. A type 1 organization shall specify expressly that, to the extent of IT outsourcing, information of the organization be clearly separated from data of an information service supplier and data of other organizations that are processed by an information service supplier and shall encrypt said information for protection.
      8. A type 1 organization shall specify expressly the permits and licenses concerning information security and quality that shall be obtained by an information service supplier.
  2. An organization shall ascertain the extent of completion of confidentiality undertakings by an information service supplier during the execution of the contract.