Founded in 2018, we focus exclusively on enabling Enterprise AI @ scale. In a very short span of time, we have become one of the fastest growing companies in America.
We focus on questions that matter to businesses with big ambitions, empowering them to elevate outcomes across their value chain.
Services
Platforms
Mid-level Senior
Mumbai
Mid-level
Remote
AiRo Digital Labs (“AiRo Digital Labs”) is committed to maintaining the highest standards of information security and data protection. This Supplier Compliance Policy outlines the obligations and expectations for our Suppliers regarding the confidentiality, integrity, and availability of information. Suppliers are expected to adhere to these principles and guidelines to ensure compliance with our security and data protection standards. a) For India Suppliers: Access our Information Security Management System Policy Statement. b) For US Suppliers: Access our Information Security Management System Policy Statement.
Definitions
For the purpose of this policy: a. Supplier: Any individual, company, or entity that provides goods, services, or access to systems or data to AiRo Digital Labs. b. MSA (Master Services Agreement) / MCA (Master Consulting Agreement): A formal written agreement that outlines the terms and conditions under which a Supplier provides goods or services to AiRo Digital Labs. c. NDA (Non-Disclosure Agreement): A legally binding agreement that governs the sharing of confidential information between AiRo Digital Labs and a Supplier. d. Confidential Information: Any information, data, or material that is not publicly available or generally known, which is considered sensitive, proprietary, or confidential by AiRo Digital Labs. This includes, but is not limited to, trade secrets, customer data, business plans, financial information, pricings and costs, proprietary software, and any information marked as "confidential." e. Data Encryption: The process of converting plain-text data into an unreadable format (cipher text) using encryption algorithms and encryption keys to protect data confidentiality. f. Incident Response Plan: A documented strategy outlining the actions to be taken when a security incident or data breach occurs, including procedures for identifying, containing, and mitigating the incident. g. Data Classification Framework: A systematic approach for categorizing data based on its sensitivity or criticality to the organization, often using labels such as "confidential," "internal use only," or "public." h. Encryption Protocols: Secure communication methods and standards, such as SSL/TLS, IPsec, or PGP, used to protect data during transmission over networks. i. Vulnerability Assessment: A systematic process of identifying and evaluating weaknesses in systems, applications, or processes that could be exploited by attackers. j. Penetration Testing: A simulated attack on a computer system or network to identify vulnerabilities and assess security controls. k. Data Retention Policy: A documented policy that defines how long data should be retained and when it should be securely disposed of or archived based on legal, business, and regulatory requirements. l. Access Control Systems: Technical and physical mechanisms, such as key cards, biometrics, and authentication protocols, used to regulate access to facilities or systems.
Confidentiality, Integrity, and Availability of Information
a. Access Control: Suppliers shall implement robust access controls, including role-based access, strong authentication, and authorization mechanisms, as specified by AiRo Digital Labs. b. Data Encryption: Suppliers must encrypt sensitive data both at rest and in transit using industry-standard encryption protocols approved by AiRo Digital Labs. c. Regular Audits: Suppliers shall conduct periodic security audits and assessments to identify vulnerabilities and ensure compliance with AiRo Digital Labs' security policies. d. Incident Response Plan: Suppliers must develop and maintain an incident response plan to address security breaches promptly and effectively in accordance with AiRo Digital Labs' guidelines. e. Employee Training: Suppliers shall provide comprehensive security training to their employees to raise awareness and educate them on security best practices as defined by AiRo Digital Labs. AiRo Digital Labs expects the Supplier to demonstrate this as and when required.
Mitigation of Non-Compliance
Information Transfer and Security
a. Data Classification: Suppliers shall classify data based on its sensitivity to determine appropriate transfer mechanisms and security controls in alignment with AiRo Digital Labs' data classification framework. b. Secure Data Transfer Protocols: Suppliers are obligated to use secure communication protocols (e.g., VPNs, encrypted channels) for transferring sensitive information as per AiRo Digital Labs' standards. c. Data Transfer Logs: Maintain logs of data transfers to ensure transparency and traceability. Provide access to these logs for auditing purposes if requested by AiRo Digital Labs. d. Data Transfer Agreements: Suppliers must establish clear agreements and protocols for transferring data to AiRo Digital Labs, including responsibilities, encryption requirements, and other security measures.
Secure Disposal of Information
Personnel and Physical Security
a. Access Control Systems: Suppliers must implement access control systems (e.g., key cards, biometrics) to restrict physical access to facilities as required by AiRo Digital Labs. b. Visitor Logs: Maintain visitor logs and require visitors to sign in and out when entering and leaving facilities in line with AiRo Digital Labs' visitor access policies. c. Employee Background Checks: Conduct background checks on employees to ensure trustworthiness and security clearance, if applicable, as specified by AiRo Digital Labs. d. Security Awareness Training: Provide security awareness training to employees regarding physical security measures and procedures, following AiRo Digital Labs' standards.
Information Access and Handling
Indemnity and Penalties for Non-Compliance
Data Breach Notification
Training and Awareness
Continuous Improvement
Incorporation into Other Agreements and Conflict Resolution
Effective Date:
This Supplier Data Integrity and Compliance Policy is effective from May 4th, 2023 and it supersedes all existing policies on the subject matter.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.