AiVRIC User Guide
Security policy

Technology Development & Acquisition

Ensures new technology is securely developed or procured.

Applies to AiVRIC workforce, partners, and subprocessors Trust Center Acceptable use

Purpose & scope

This policy guides how AiVRIC designs, operates, and validates Technology Development & Acquisition across production, corporate, and partner environments.

It applies to employees, contractors, vendors, and any system interacting with AiVRIC data or services.

Key controls

  • Evaluate security and compliance requirements before build/buy decisions.
  • Include security criteria in vendor and product selection.
  • Conduct security reviews and legal assessments before procurement.
  • Maintain inventory of third-party tools with owners and renewal dates.

Operating procedures

  • Submit new tech requests through intake with risk and data details.
  • Perform security assessment and data processing review for vendors.
  • Track implementation and decommission timelines in the project plan.

Evidence & ownership

Owner: Security & Compliance. Review cadence: annually or after material changes.

Evidence: Collected via AiVRIC audit logs, ticketing systems, monitoring dashboards, and vendor records as appropriate to this policy area.

Contact: [email protected]