Skip to main content
SOP owner: Operations / Legal — Last reviewed: [Date] — ID: SOP-OPS-002

Overview

This SOP covers the full lifecycle of third-party vendor relationships at Blevins Holdings — from evaluating a new vendor through active management and eventual offboarding. All vendors must go through this process before receiving payment or access to company data or systems. Why this matters: Vendors are an extension of our operations. A vendor’s security failure, compliance gap, or service disruption can directly impact Blevins and our clients. Structured vendor management reduces that risk. Key stakeholders:
RoleResponsibility
Business ownerIdentifies the need, champions the vendor relationship
IT SecurityReviews vendor security posture and data handling
LegalReviews and executes contracts
FinanceHandles payment, tracks contracts in vendor register
OperationsOversees the process and maintains the vendor register

Vendor register

All active vendors are tracked in the Vendor Register, maintained by Operations/Finance at [link to vendor register — e.g., in Notion, Airtable, Google Sheets]. The register includes: vendor name, category, contract value, contract end date, renewal date, business owner, risk tier, last review date.

Vendor risk tiers

Vendors are assigned a risk tier based on their access to company data and systems:
TierDescriptionExamples
Tier 1 — CriticalAccess to production systems, sensitive data, or critical infrastructureCloud providers, payroll, HRMS, security tools
Tier 2 — SignificantAccess to internal systems or non-public data, or significant operational dependencyAccounting software, CRM, project management
Tier 3 — StandardNo access to data systems; administrative or one-time purchasesOffice supplies, event venues, marketing agencies
Risk tier determines the depth of the due diligence and review frequency.

Process steps

1

Submit a vendor request

Who: Business ownerBefore engaging any new vendor, the business owner submits a Vendor Request using [IT/Operations intake form — link to be added]. The request must include:
  • Vendor name, website, and contact
  • What they’ll provide and why this vendor (vs. an existing contract)
  • Estimated contract value and duration
  • Whether the vendor will have access to company or client data (and if so, what kind)
  • Whether the vendor will be given access to any company systems or network
  • Budget code and approval from department head (for contracts over $[X])
Do not sign up for a vendor service, share company data, or grant any access until this process is complete. Unauthorized vendor use violates the Procurement Policy and may create legal or security liability.
2

Initial review and risk tier assignment

Who: OperationsOperations reviews the request and assigns the vendor a risk tier (Tier 1, 2, or 3). The tier determines the remaining review steps.
TierRequired review
Tier 1 — CriticalIT security review + Legal review + Finance approval
Tier 2 — SignificantIT security review (abbreviated) + Legal review
Tier 3 — StandardBusiness owner certification + Finance approval
Operations notifies the business owner of the tier and routes the request to the appropriate reviewers.
3

IT security review

Who: IT SecurityRequired for Tier 1 and Tier 2 vendors. IT Security evaluates the vendor’s security posture and data handling practices. The review covers:
  • Data handling: What data will the vendor access, store, or process? Where? For how long?
  • Certifications: Does the vendor hold SOC 2 Type II, ISO 27001, or equivalent?
  • Encryption: Is data encrypted at rest and in transit?
  • Access controls: Does the vendor have strong authentication and least-privilege access controls?
  • Incident history: Any known data breaches or security incidents?
  • Sub-processors: Does the vendor use sub-processors? If so, are they disclosed?
  • Business continuity: Does the vendor have a documented BCP?
IT Security may request the vendor’s security documentation (SOC 2 report, penetration test summary, security questionnaire response). Vendors who cannot provide adequate documentation will not be approved for Tier 1 or 2 relationships.Typical timeline: 3–5 business days for Tier 2; 1–2 weeks for Tier 1.
4

Legal review and contract execution

Who: LegalAll vendors must have a signed agreement before any work begins or data is shared. Legal reviews vendor contracts for:
  • Data Processing Agreement (DPA): Required for any vendor that processes personal data or company data
  • Liability and indemnification clauses
  • Intellectual property ownership — ensure Blevins retains rights to its data and work product
  • Termination and exit provisions — how data is returned or deleted upon contract end
  • SLAs and remedies
  • Compliance certifications and representations
Legal uses the Blevins standard vendor template where possible. Deviations from standard terms require Legal’s written approval.
No one except designated signatories (as determined by the signing authority policy) may sign contracts on behalf of Blevins Holdings. Do not sign vendor agreements yourself.
5

Add to vendor register and provision access

Who: Operations (register); IT (access)Once all approvals are complete and the contract is signed:
  1. Operations adds the vendor to the Vendor Register with all relevant details
  2. IT provisions any required system access with least-privilege principles — only the access the vendor needs, nothing more
  3. The business owner receives confirmation that the vendor is active
For data sharing: IT sets up the approved data transfer method (secure file transfer, API with authentication, encrypted email, etc.) before any data is shared with the vendor.

Ongoing vendor management

Performance monitoring

Business owners are responsible for monitoring vendor performance against contracted SLAs and deliverables. Significant performance issues should be documented and escalated to Operations and Legal if they may affect the contract. Track vendor performance notes in the Vendor Register.

Annual vendor review

All active vendors are reviewed annually. The review includes:
ItemDetails
Performance assessmentBusiness owner evaluates whether the vendor is meeting expectations
Security review updateTier 1 and 2 vendors: IT requests updated security documentation
Contract reviewIs the contract still fit for purpose? Is the price competitive?
Risk re-assessmentHas the vendor’s risk tier changed?
Renewal decisionRenew, renegotiate, or offboard?
Operations coordinates the annual review and notifies business owners at least 60 days before contract renewal dates.

Dealing with vendor incidents

If a vendor experiences a data breach, security incident, or significant service disruption that affects Blevins:
  1. Notify IT Security immediately at security@blevinsholdings.com
  2. Notify Legal if personal data may have been involved
  3. Invoke the vendor’s SLA and incident response obligations under the contract
  4. Document the incident in the Vendor Register
  5. If appropriate, initiate a review of the vendor relationship

Offboarding a vendor

When a vendor relationship ends (contract not renewed, vendor replaced, or terminated for cause):
1

Notify IT and Operations

The business owner notifies IT and Operations at least 30 days before the end date (or immediately if the termination is for cause).
2

Data return and deletion

IT confirms that all company or client data held by the vendor is returned or destroyed per the contract terms. The vendor provides written confirmation of data deletion.
3

Revoke access

IT revokes all system access and API credentials on or before the contract end date. Access revocation is confirmed and logged.
4

Final payment and close-out

Finance processes any final invoices and marks the contract as closed in the vendor register.
5

Archive in vendor register

Operations updates the vendor register to reflect the vendor’s inactive status. Records are retained per the record retention schedule.

Vendor due diligence checklist

Use this checklist for Tier 1 and Tier 2 vendor evaluations: Security & compliance
  • Obtained and reviewed SOC 2 Type II report (or equivalent) from last 12 months
  • Confirmed data is encrypted at rest and in transit
  • Confirmed vendor has documented incident response and breach notification procedures
  • Reviewed vendor’s sub-processor list
  • Confirmed MFA is required for vendor employee access to systems that hold our data
Legal & contractual
  • DPA signed (if vendor processes personal data)
  • SLAs documented and acceptable
  • Data deletion/return provision included
  • IP ownership and work product rights clearly defined
  • Termination for convenience provision included
Financial & operational
  • Vendor financials or stability confirmed (for critical vendors)
  • BCP/DR capabilities confirmed
  • References checked (for significant new relationships)


Last updated: [Date] — SOP owner: Operations / Legal