Third Party Connection Policy

The Third Party Connection Policy covers company standards for directly connecting to third parties such as vendors, partners, customers, consultants.  It includes topics such as the use and security of these connections, access restrictions, and audits.

Direct connections to external entities are sometimes required for business operations.  These connections are typically to provide access to vendors or customers for service delivery. Since the company's security policies and controls do not extend to the users of the third parties' networks, these connections can present a significant risk to the network and thus require careful consideration.

A Third Party Connection Policy developed with the application will include the following detailed sections:

1. Overview
2. Purpose
3. Scope
4. Policy
    4.1. Use of Third Party Connections
    4.2. Security of Third Party Access
    4.3. Restricting Third Party Access
    4.4. Auditing of Connections
    4.5. Applicability of Other Policies
5. Enforcement
6. Definitions
7. Revision History

Available in the Silver and Gold Packages, this is a policy that is intended to be used by technical staff and management only.

Your custom Third Party Connection Policy will be delivered immediately upon completion of the wizard via email, as both a PDF and an RTF file.  RTF files are editable in all major word processing programs, including Microsoft Word.

Our security policies were written based on a cohesive and integrated approach using security best practices stemming from the C-I-A triad of confidentiality, integrity, and availability.  This approach aligns with both real-world and industry standard-based objectives, resulting in an invaluable resource for your security policy management.  A Third Party Connection Policy developed with the wizard will provide the foundation for a realistic, practical implementation of your IT security policy program.

Please contact us if you have any questions about this policy. has delivered thousands of IT Security Policies to companies from 5 to 50,000 employees.  The management of has over 20 years of successful experience in the field of information security.

Buy Now