<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=229461991482875&amp;ev=PageView&amp;noscript=1">

The Digital Operational Resilience Act, known as DORA, will soon be in force and it will have a dramatic impact on your vendor contracts.

We recently created a DORA summary and in this article, I’m going to explain:

 

DORA Vendor Contracts requirements

The EU expects public authorities to develop standard clauses to address DORA regulatory needs around mandatory clauses.

It suggests financial services companies and ICT third-party vendors use such language when available. However, I’d suggest you get ahead and work on standard wording that you can add to your contracting clause bank ahead of time.

Every ICT Services contract you have must:

  • Be in writing and digital, not paper-based, although paper-based documents are permitted
  • Be securely documented and accessible at all times. I’d suggest storing them within a VCLM contract repository so you can access them whenever needed.
  • Be understandable
  • Provide a register of information for all contractual agreements for ICT services and the respective vendors.
  • Document critical and non-critical ICT vendors.
  • Contain the mandatory clauses.

You must also report annually on “the number of new arrangements on the use of ICT services, the categories of ICT third-party service providers, the type of contractual arrangements and the ICT services and functions which are being provided. (Article 23 (3)).

Article 28 (1) (a) states:

“financial entities that have in place contractual arrangements for the use of ICT services to run their business operations shall, at all times, remain fully responsible for compliance with, and the discharge of, all obligations under this Regulation and applicable financial services law”.


You’ll need to ensure that your vendors are flowing contract clauses down through their supply chains. You should also deploy effective contract management otherwise you may fall foul of being “fully responsible”.

Pre-Signature DORA Contract Responsibilities

Before signing any vendor contract that falls within the remit of DORA, you’ll need to carry out the following six activities.

1. Define Critical or Important Function Support

DORA is focused on those contract arrangements that truly matter and it terms them critical or important. Critical vendor contracts incur a higher level of compliance requirements.

By way of an analogy, we would not care about a subscription to Canva for the marketing team as this does not constitute a “critical” service. However, for a financial services company, using a software provider that enables you to identify hidden proxies that might be used to commit fraud is likely to constitute a “critical” or “important” vendor and contract arrangement.


You’ll need to review all your vendors to understand their importance to your organisation. Then, you should apply appropriate categorisation and vendor segmentation.

2. Assess if supervisory conditions for contracting are met

The requirement to "assess if supervisory conditions for contracting are met" focuses on ensuring that financial entities assess and comply with specific conditions or requirements when contracting ICT services.

These supervisory conditions can include various aspects such as security, data protection, and operational resilience.

The goal is to ensure that any third-party service providers or ICT services these financial entities use meet strict standards that align with the overall objectives of DORA to maintain operational resilience.

3. Identify Risks and Prioritise Management

As you’d expect, there is a strict requirement for risk management in Article 28.4.(c). It states:

“Identify and assess all relevant risks in relation to the contractual arrangement, including the possibility that such contractual arrangement may contribute to reinforcing ICT concentration risk as referred to in Article 29”.


Let’s break this down.

a) Relevant Risks Assessment

Financial entities must conduct comprehensive assessments of all risks associated with their contractual arrangements with ICT third-party service providers.

This isn't just about the immediate risks of service disruption or data breaches.

It extends to broader considerations such as the impact on the entity's overall operational resilience.

b) ICT Concentration Risk

A specific focus is placed on assessing the potential for ICT concentration risk, referring to the scenario where too many entities in the financial sector rely on a limited number of ICT service providers.

This could lead to systemic vulnerabilities if one of these providers fails or experiences significant issues.

If your business has concentrated risk, you might need to change how you work.

The ideal scenario is that you have a digital workflow in place for all of your contract reviews. You can then have a dedicated Risk Identification phase where you spend time assessing potential issues. Commit them to a vendor risk register that enables you to manage or accept the risk as is.

 

4. Complete Vendor Due Diligence

Before entering into any contractual agreement, financial entities are expected to vet prospective ICT third-party service providers.

This due diligence process involves evaluating the provider's:

  • Reliability
  • Security measures
  • Compliance track record
  • Ability to meet the entity's specific requirements.

This is vendor management best practice and we’d highly recommend you do this for every vendor you onboard.

Vendor onboarding is simple when you have a VCLM platform.


Once a request is raised via the Employee Portal to onboard a new vendor, you can complete all your checks using pre-built forms and live risk data utilising the Market IQ suite.

Market IQGatekeeper's method for managing vendor credit and cyber risks 24/7/365

The vendor selection process should be rigorous and transparent, ensuring that the chosen ICT third-party service provider aligns with the financial entity's needs and regulatory obligations.

This might mean you adopt a more agile procurement process to assess and negotiate with multiple vendors in this space.

5. Identify Conflicts of Interest

Financial entities must proactively identify and assess potential conflicts of interest with ICT third-party service providers.

Conflicts of interest could compromise the impartiality or integrity of the services provided and potentially pose risks to the entity's operational resilience."


After identifying potential conflicts of interest, financial entities must take appropriate steps to manage, mitigate, or eliminate them.

This might involve:

  • Adjusting the contractual arrangement
  • Seeking alternative providers
  • Implementing oversight mechanisms to monitor the impact of these conflicts on the entity's operations and compliance.

With the Market IQ Suite from Gatekeeper, you can identify potential conflicts of interest in ownership by using our integration with Security Scorecard.

6. Assess Information Security Standards

 Article 28.5 states:

“Financial entities may only enter into contractual arrangements with ICT third-party service providers that comply with appropriate information security standards. When those contractual arrangements concern critical or important functions, financial entities shall, prior to concluding the arrangements, take due consideration of the use, by ICT third-party service providers, of the most up-to-date and highest quality information security standards”.


This requirement safeguards financial entities, ensuring their data and ICT systems are protected against cyber threats and vulnerabilities through established security practices.

An assessment might involve reviewing certifications, audit reports, or other documentation that evidences compliance.

You can build these checks into the vendor onboarding process. From there, you can maintain compliance effortlessly by building a file expiry workflow to automate the capture of updated certificates, reports and documents. These can be reviewed with the wider team. 

Screenshot - GK - New Contract Request Legal Review

For many people still operating manually, this will be a monumental challenge. However, if you are utilising a VCLM approach this should be easy to deploy.

Amending existing contracts for Mandatory DORA Clauses

 Here’s a checklist of what you need when it comes to DORA-compliant contracts:

    • A clear and complete description of the services
    • Location of services performed
    • Service level descriptions
    • Detailed data protection provisions
    • Appropriate termination rights and exit strategies
    • Minimum notice periods
    • Provisions requiring full cooperation with the competent authorities
    • Assistance (and cost) in the event of an ICT incident

When it comes to provisions that require assistance, collaboration, and involvement in your operational resilience training, it’s unlikely you’ll have these in place with existing vendors.

I want to focus on two of these provisions that might require more work than the others: termination and exit strategies.

Termination Provisions in ICT Services Contracts for DORA

Article 28.7 states:

Financial entities shall ensure that contractual arrangements on the use of ICT services may be terminated in any of the following circumstances:

(a) significant breach by the ICT third-party service provider of applicable laws, regulations or contractual terms;

(b) circumstances identified throughout the monitoring of ICT third-party risk that are deemed capable of altering the performance of the functions provided through the contractual arrangement, including material changes that affect the arrangement or the situation of the ICT third-party service provider;

(c) ICT third-party service provider’s evidenced weaknesses pertaining to its overall ICT risk management and in particular in the way it ensures the availability, authenticity, integrity and, confidentiality, of data, whether personal or otherwise sensitive data, or non-personal data;

(d) where the competent authority can no longer effectively supervise the financial entity as a result of the conditions of, or circumstances related to, the respective contractual arrangement.


Points (b) and (c) will need additional work as it is unlikely that you will have these in your current contracts.

Any existing agreement that isn't compliant with DORA must be moved into a contract amendment workflow so you can incorporate additional terms in a structured and auditable format. Learn more about this in our webinar below. 

 

Exit Strategies in ICT Services Contracts for DORA

DORA mandates financial entities to develop robust exit strategies for ICT services that support critical or important functions, emphasising operational resilience and regulatory compliance.

Here's a summary of the key requirements:

  • Comprehensive Exit Strategies: Financial entities must design exit strategies that consider potential risks from ICT third-party service providers, including provider failure, quality deterioration of ICT services, business disruptions, and material risks to ongoing ICT service deployment. These strategies should also cover scenarios of contract termination under specified circumstances.
  • Minimisation of Disruption: The exit process should ensure that the entity's business activities continue without disruption, compliance with regulatory requirements is maintained, and the quality and continuity of services are not adversely affected.
  • Documentation and Testing: Exit plans must be well-documented, thoroughly tested, and periodically reviewed to ensure their effectiveness and readiness for implementation. This aligns with the principle of preparedness and resilience and might require support from your vendors to test this.
  • Alternative Solutions and Transition Plans: Entities are required to identify alternative ICT solutions and develop detailed transition plans. These plans should facilitate the secure and complete transfer of ICT services and relevant data to another third-party provider or back in-house, ensuring minimal impact on operations. It signals the need to competitively source new vendors and not to alienate your organisation with any who are unsuccessful in that competitive process.

Closing Thoughts

For many in the Financial Services, you’ll already be under the EBA remit and your outsourcing requirement will be in place.

However, there will be a large number of organisations that fall under the DORA remit that don’t have that same level of maturity. They will need to get ahead and be in a good place by the end of Q3 2024.

The best way to tackle this is through VCLM as it takes care of the three critical components of DORA:

  • Vendor Lifecycle Management
  • Contract Lifecycle Management
  • Third-Party Risk Management 

If you’re tired of using spreadsheets, outdated emails, and working in chaos, book a call to speak with one of our VCLM experts to help you get DORA-compliant.

Daniel Barnes
Daniel Barnes

Daniel Barnes is a seasoned Procurement and Contract Management Leader, with a Masters in Commercial Law from the University of Southampton. He’s on a mission to transition the sector from manual, spreadsheet-driven processes to efficient, automated operations. Daniel hosts the Procurement Reimagined Podcast, exploring innovative strategies to modernise procurement and contract management, striving for a more streamlined and value-driven industry.

Tags

Contract Management , Control , Vendor Management , Compliance , Contract Lifecycle Management , Contract Management Software , Visibility , Contract Lifecycle , Case Study , Vendor and Contract Lifecycle Management , Supplier Management , Vendor Management Software , Contract Risk Management , Contract Management Strategy , Contract Repository , Regulation , Risk Mitigation , Third Party Risk Management , Contract Automation , Regulatory compliance , VCLM , TPRM , Workflows , Artificial Intelligence , CLM , Contract Ownership , Contract Visibility , Contract and vendor management , Contracts , Procurement , Supplier Performance , Supplier Risk , contract renewals , Legal , Legal Ops , NetSuite , Podcast , Risk , Vendor Onboarding , Contract compliance , Financial Services , Future of Procurement , Gatekeeper Guides , Procurement Reimagined , Procurement Strategy , RFP , Supplier Relationships , Business continuity , CLM solutions , COVID-19 , Contract Managers , Contract Performance , Contract Redlining , Contract Review , Contract Risk , ESG , Metadata , Negotiation , SaaS , Supplier Management Software , Vendor Portal , Vendor risk , webinar , AI , Clause Library , Contract Administration , Contract Approvals , Contract Management Plans , Cyber health , ESG Compliance , Kanban , Market IQ , RBAC , Recession Planning , SOC Reports , Security , SuiteWorld , Sustainable Procurement , collaboration , Audit preparedness , Audit readiness , Audits , Business Case , Clause Template , Contract Breach , Contract Governance , Contract Management Audit , Contract Management Automation , Contract Monitoring , Contract Obligations , Contract Outcomes , Contract Reporting , Contract Tracking , Contract Value , DORA , Dashboards , Data Fragmentation , Digital Transformation , Due Diligence , ECCTA , Employee Portal , Excel , FCA , ISO Certification , KPIs , Legal automation , LegalTech , Mergers and Acquisitions , Obligations Management , Partnerships , Procurement Planning , Redline , Scaling Business , Spend Analysis , Standard Contractual Clauses , SuiteApp , Suppler Management Software , Touchless Contracts , Vendor Relationship Management , Vendor risk management , central repository , success hours , time-to-contract , APRA CPS 230 , APRA CPS 234 , Australia , BCP , Bill S-211 , Biotech , Breach of Contract , Brexit , Business Growth , CCPA , CMS , CPRA 2020 , CSR , Categorisation , Centralisation , Certifications , Cloud , Conferences , Confidentiality , Contract Ambiguity , Contract Analysis , Contract Approval , Contract Attributes , Contract Challenges , Contract Change Management , Contract Community , Contract Disengagement , Contract Disputes , Contract Drafting , Contract Economics , Contract Execution , Contract Intake , Contract Management Features , Contract Management Optimisation , Contract Management pain points , Contract Negotiation , Contract Obscurity , Contract Reminder Software , Contract Requests , Contract Routing , Contract Stratification , Contract Templates , Contract Termination , Contract Volatility , Contract relevance , Contract relevance review , Contracting Standards , Contracting Standards Review , Cyber security , DPW , DPW, Vendor and Contract Lifeycle Management, , Data Privacy , Data Sovereignty , Definitions , Disputes , EU , Electronic Signatures , Enterprise , Enterprise Contract Management , Financial Stability , Force Majeure , GDPR , Gatekeeper , Healthcare , ISO , IT , Implementation , Integrations , Intergrations , Key Contracts , Measurement , Microsoft Word , Modern Slavery , NDA , Operations , Parallel Approvals , Pharma , Planning , Port Agency , Pricing , RAG Status , Redlining , Redlining solutions , Requirements , SaaStock , Shipping , Spend optimzation , Startups , Supplier Cataloguing , Technology , Usability , Vendor Categorisation , Vendor Consolidation , Vendor Governance , Vendor Qualification , Vendor compliance , Vendor reporting , Voice of the CEO , automation , concentration risk , contract management processes , contract reminders , cyber risk , document automation , eSign , enterprise vendor management , esignature , post-signature , remote working , vendor centric , vendor lifecycle management

Related Content

 

subscribe to our newsletter

 

Sign up today to receive the latest GateKeeper content in your inbox.

Subscribe to Email Updates