Compliance Audits and External Communications¶
2025.2
CAP Index may be requested occasionally to share additional details regarding its compliance, privacy and security program by an external entity such as a customer, media, legal or law enforcement. Such external communication, beyond what is already publicly published, needs to comply with the following policies and procedures.
Policy Statements¶
CAP Index policy requires that:
(a) CAP Index operations must comply with all applicable laws, regulations, security standards and frameworks. External audits shall be conducted accordingly to each applicable compliance requirement.
-
GDPR. CAP Index must protect the personal data and privacy of EU citizens according to the regulatory requirements set forth in the European Union General Data Protection Regulation (GDPR).
-
NIST. CAP Index security shall implement the applicable controls outlined in NIST Special Publication 800-53.
-
PCI. CAP Index must protect the payment card data processed and/or stored according to the requirements in the latest Payment Card Industry Data Security Standard (PCI DSS).
(b) All external communications related to compliance and customer/employee privacy must follow pre-established procedures and handled by approved personnel. This includes but is not limited to distribution of audit reports, assessment results, incidents and breach notification.
(c) Audit and compliance reports may be shared with an external party only when under signed NDA and approved by CAP Index Security and/or Privacy Officer.
Controls and Procedures¶
Compliance Program Management¶
CAP Index management and security/compliance team has identified and regularly reviews all relevant statutory, regulatory, and contractual requirements.
CAP Index’s compliance policy includes requirements to meet any and all applicable compliance requirements.
Additionally, the Vendor Risk Management policies and procedures specify the details related to contractual agreements with clients, partners and vendors, as well as requirements and process related to intellectual property rights and the use of proprietary software products.
Requesting Audit and Compliance Reports¶
CAP Index, at its sole discretion, shares audit reports, including any Corrective Action Plans (CAPs) and exceptions, with customers on a case by case basis. All audit reports are shared under explicit NDA in CAP Index format between CAP Index and party to receive materials. Audit reports can be requested by CAP Index workforce members for Customers or directly by CAP Index Customers.
The following process is used to request audit reports:
- A request may be sent by email to compliance@capindex.com or by submitting a request via CAP Index Internal Support Portal or Email. In the request, please specify the type of report being requested and any required timelines for the report.
- An Issue with the details of the request into the CAP Index Security Project on Jira, which is used to track requests status and outcomes.
- CAP Index security team will confirm if a current NDA is in place with the party requesting the audit report. If there is no NDA in place, CAP Index will send one for execution.
- Once it has been confirmed that an NDA is executed, CAP Index staff will move the Jira Issue to “Under Review”.
- The CAP Index Security Officer or Privacy Officer must Approve or Reject the Issue. If the Issue is rejected, CAP Index will notify the requesting party that we cannot share the requested report.
- If the Issue has been Approved, CAP Index will send the customer the requested audit report and complete the Jira Issue for the request.
See detailed policy and procedures in Breach Notification
External Audits of Information Access and Activity¶
Prior to contracting with an external audit firm, CAP Index shall:
- Outline the audit responsibility, authority, and accountability
- Choose an audit firm that is independent of other organizational operations
- Ensure technical competence of the audit firm staff
- Require the audit firm’s adherence to applicable codes of professional ethics
- Assign organizational responsibility for supervision of the external audit firm
- Obtain a signed GDPR data processing agreement, if any personal data will be shared/accessed during the audit
Whenever possible, a third party auditing vendor should not be providing the organization IT oversight services (e.g., vendors providing IT services should not be auditing their own services to ensure separation of duties).
Contacts for External Communications Requests¶
Direct all other communication requests to one of the following:
-
For incident reporting, vulnerability disclosure and other security related inquiries:
-
For privacy concerns, including report of violation:
-
For all compliance related issues, including request of audit reports:
Continuous Compliance Monitoring¶
The status of compliance is tracked via Microsoft Security Center. Compliance dashboards are configured with applicable internal and external standards and frameworks. Any potential gaps detected are reported on the compliance dashboards.