IT Risk Management Policy 2024
IT Risk Management Policy 2024
Table of Contents
Important Note: ....................................................................................................................................... 2
1. Purpose ............................................................................................................................................ 3
2. Scope ................................................................................................................................................ 3
3. Periodic review of IT/ Information Security/Privacy related risks ................................................... 3
4. IT and Information Security Risk Management Framework ............................................................ 3
5. Risk Assessment ............................................................................................................................... 3
6. Risk Management Areas and frequency .......................................................................................... 4
Internal risk management:........................................................................................................................ 4
Partner risk management: ........................................................................................................................ 4
Third party risk management: .................................................................................................................. 4
7. Risk Management Framework ......................................................................................................... 5
Risk Identification: .................................................................................................................................... 5
Risk Assessment: ....................................................................................................................................... 5
Risk Treatment: ......................................................................................................................................... 5
Monitor results: ........................................................................................................................................ 5
8. Roles and Responsibilities and documentation ............................................................................... 5
9. Compliance with Standards and Regulations .................................................................................. 5
10. Review and Improvement ................................................................................................................ 6
11. Document review:............................................................................................................................ 6
Important Note: This document is intended solely for the use of the individual or entity to whom
it is transmitted to, and others authorized to receive it. It may contain confidential or legally privileged
information. If you are not the intended recipient you are hereby notified that any disclosure, copying,
distribution or taking any action in reliance on the contents of this document is strictly prohibited and
may be unlawful. If you have received this document in error, please notify us immediately.
1. Purpose
The purpose of this Risk Management Policy is to establish a context based robust framework for
identifying, assessing, and managing risks associated with our operations at Vivriti Capital Limited,
aligning with legal, regulatory, compliance requirements and ISO 27001 (Information Security
Management) and ISO 27701 (Privacy Information Management) standards. This policy also addresses
third-party risk assessment, including co-lending partners and others.
2. Scope
This policy applies to all aspects of Vivriti Capital Limited's operations, including information security, data
privacy, and third-party relationships. It encompasses the entire organization's risk context as per the RBI
guidelines and master direction on IT Governance, risk, control and assurance practices, IT outsourcing
activities and enhanced due diligence and technology controls/requirements on co lending partners
(digital lending in particular).
5. Risk Assessment
• The risk assessment for each information asset within Vivriti’s scope shall be guided by
appropriate security standards/ IT control frameworks.
• Vivriti shall ensure that all staff members and service providers comply with the extant
information security and acceptable-use policies as applicable to them.
• The organization shall review their security infrastructure and security policies at least annually,
factoring in their own experiences and emerging threats and risks and take steps to adequately
tackle cyber-attacks including phishing, spoofing attacks and mitigate their adverse effects.
• Vulnerability Assessment (VA) / Penetration Testing (PT) shall be conducted as per the VAPT
policy.
• An approved Cyber Incident Response and Recovery Management procedure shall be in place
and the same shall address the classification and assessment of incidents; include a clear
communication strategy and plan to manage such incidents, contain exposures and achieve
timely recovery.
• Vendors/service providers.
• New IT system software procurement/integration.
• Existing software vendors/OEM who have access to Vivriti’s data.
Risk management shall be conducted at least on an annual basis on the identified areas and the
identified critical risks shall be discussed and presented to the risk management committee of the
board.
Risk Identification:
This shall happen in multiple ways like audit, assessment, incident etc. Once the risk is identified it is
documented.
Risk Assessment:
Once the risk is identified, impact assessment is conducted, and appropriate ranking is given to the risk
as key/non-key. All fraud risks and any other risk which can create financial /reputational impact are
categorized as key risk.
Risk Treatment:
The identified and assessed risk shall be mitigated (by applying appropriate controls), transferred (to a
third party), avoided (by identifying alternatives), accepted (only if within limits).
Monitor results:
Once a decision has been made on the identified risks, the implementation is done and the same is
monitored for effectiveness and maintenance of the same within the acceptable limit.
All risk management and assessment reports and related documentation shall be presented to the
Internal Audit team or any other audit that is carried out to meet regulatory and compliance
requirements.
data privacy regulations that may impact the NBFC's operations measures shall be in place to ensure risk
assessments and controls align with these requirements.