Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. 1. Company Information: Basic information about the supplier organization including legal name, address, primary contacts, and business registration details
2. 2. Service Overview: Description of services/products provided to the organization and their criticality
3. 3. Data Processing Activities: Details about what types of data will be processed, including personal data categories under FADP
4. 4. Information Security Management: Questions about the supplier's information security management system, certifications, and governance structure
5. 5. Access Control and Identity Management: Assessment of access control policies, authentication methods, and privilege management
6. 6. Network and System Security: Questions about network architecture, system hardening, and security controls
7. 7. Data Protection and Privacy: Evaluation of data protection measures, privacy controls, and compliance with Swiss data protection laws
8. 8. Incident Management and Response: Assessment of incident detection, response procedures, and breach notification processes
9. 9. Business Continuity and Disaster Recovery: Questions about business continuity planning, backup procedures, and disaster recovery capabilities
10. 10. Third-Party Risk Management: Information about the supplier's own third-party risk management and supply chain security
11. 11. Physical Security: Assessment of physical security measures for facilities and data centers
12. 12. Compliance and Certification: Questions about regulatory compliance, certifications, and audit reports
1. Cloud Security Controls: Additional section for suppliers providing cloud services, covering cloud-specific security controls and compliance
2. Financial Services Requirements: Specific section for suppliers serving financial institutions, addressing FINMA requirements and financial sector regulations
3. Healthcare Data Protection: Additional section for suppliers handling healthcare data, covering specific medical data protection requirements
4. Development Security: Section for software development suppliers, covering secure development practices and application security
5. IoT Security: Section for suppliers providing IoT devices or services, addressing device security and network protocols
1. Appendix A: Definitions and Abbreviations: Detailed list of technical terms, security concepts, and abbreviations used in the questionnaire
2. Appendix B: Required Certificates and Documentation: List of required supporting documents, certificates, and audit reports
3. Appendix C: Security Controls Checklist: Detailed checklist of specific security controls and requirements
4. Appendix D: Incident Response Template: Template for describing incident response procedures and breach notification processes
5. Appendix E: Data Processing Details: Detailed template for describing data processing activities and data flows
6. Schedule 1: Service Level Requirements: Specific security-related service levels and performance metrics
7. Schedule 2: Compliance Requirements Matrix: Matrix mapping questionnaire responses to specific regulatory requirements
Find the document you need
Hazard And Risk Assessment
A Swiss-compliant workplace safety document that identifies, analyzes, and provides control measures for occupational hazards and risks.
Low Voltage Directive Risk Assessment
A technical safety assessment document for low voltage electrical equipment compliance under Swiss regulations and aligned European standards.
Risk Assessment Questionnaire For Banks
A FINMA-compliant risk assessment questionnaire for banks operating in Switzerland, designed to evaluate and document various banking risks under Swiss regulatory requirements.
Vendor Risk Assessment Questionnaire
A Swiss law-compliant questionnaire for assessing vendor risks, regulatory compliance, and operational capabilities.
Supplier Security Assessment Questionnaire
A Swiss-compliant security assessment questionnaire for evaluating suppliers' security controls and data protection measures under Swiss federal regulations.
Last Minute Risk Assessment
A Swiss-compliant safety document for rapid workplace risk evaluation and mitigation before commencing immediate work activities.
Criticality Assessment Matrix
A Swiss law-governed framework for systematically assessing and categorizing business-critical processes, systems, and assets, incorporating local regulatory requirements and risk management standards.
Security Assessment Report
A comprehensive security evaluation document that assesses organizational vulnerabilities and provides remediation recommendations, aligned with Swiss federal regulations and security standards.
Cyber Risk Assessment
Swiss-law governed agreement for conducting professional cyber risk assessments, ensuring compliance with local data protection and cybersecurity regulations.
Fire Risk Assessment Plan
A Swiss-compliant fire risk assessment document detailing fire safety measures, emergency procedures, and risk controls in accordance with VKF/AEAI guidelines.
Risk Assessment Plan
A Swiss-compliant document that systematically assesses and outlines plans to manage organizational risks, following federal safety regulations and standards.
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
