Supplier Management at Mo Tech Security

Last updated: August 25, 2025

Mo Tech Security recognises that suppliers and third-party partners play a critical role in delivering secure, reliable services to our customers. Our Supplier Management program ensures suppliers meet our standards for security, quality, compliance, and operational resilience throughout the supplier lifecycle.

Supplier selection

We apply a consistent selection process to onboard suppliers who align with our technical, security, and commercial expectations:

  • Due diligence: Legal, financial and reputational checks prior to engagement.
  • Security baseline: Suppliers must meet minimum security requirements (data protection, encryption, access controls).
  • Commercial & delivery checks: Review of SLAs, pricing, capacity, and experience delivering similar services.
  • Compliance vetting: Verification of regulatory and standards requirements relevant to the service (e.g., data residency, export controls).

Supplier onboarding

Onboarding formalises expectations and integrates suppliers into our operational model:

  • Contractual agreements including confidentiality, data processing addenda, and clear service level targets.
  • Technical integration guides, secure connection standards, and configuration baselines.
  • Defined points of contact and escalation paths for operations, security, and commercial teams.

Supplier risk management

We continuously assess and manage supplier risk using a mix of qualitative and quantitative controls:

  • Risk assessments: Initial classification and periodic reassessments (security, operational, financial, compliance).
  • Mitigation plans: Remediation roadmaps, contractually required fixes, or compensating controls where needed.
  • Ongoing monitoring: Performance metrics, security telemetry, and periodic evidence collection (scan results, audit reports).

Performance management

We monitor supplier delivery against agreed SLAs and KPIs, and run regular performance reviews:

  • Defined KPIs and SLA targets documented in contracts.
  • Quarterly or monthly performance reviews and scorecards for strategic suppliers.
  • Continuous improvement programs where gaps are identified.

Supplier security requirements

Suppliers are required to implement appropriate security controls and evidence them as part of onboarding and ongoing review:

  • Data protection and confidentiality agreements (DPA) for any supplier handling personal or sensitive data.
  • Network and application security controls (firewalls, patching, MFA for admin access).
  • Incident detection and notification obligations — suppliers must notify Mo Tech Security of relevant incidents within agreed SLAs.
  • Proof of security posture (third-party audit reports, penetration test summaries, vulnerability scan results) on request.

Audits & assurance

For higher-risk or critical suppliers we require enhanced assurance:

  • Right-to-audit clauses and the ability to request audit evidence.
  • Periodic independent assessments or SOC-type reports where appropriate.
  • Technical spot checks and penetration testing coordination when supplier code or infrastructure interfaces with our services.

Change & configuration management

Suppliers must follow controlled change processes for environments that affect our services:

  • Advance notice for planned maintenance impacting production services.
  • Rollback plans and adequately tested deployments.
  • Change approvals for anything that affects security posture or customer data.

Incident response & communication

When incidents involve suppliers we coordinate response activities and require timely communication:

  • Immediate notification of incidents that affect confidentiality, integrity, or availability.
  • Joint incident handling where supplier actions are required for containment or remediation.
  • Post-incident reviews and evidence-sharing to identify root causes and preventive actions.

Exit & transition planning

We plan for safe supplier offboarding to protect continuity and data:

  • Data return or secure deletion procedures defined in contracts.
  • Transition support to alternative suppliers or back to Mo Tech Security operations.
  • Preservation of logs and evidence where required for compliance or investigations.

Ethics, compliance & sustainability

We expect suppliers to operate ethically and comply with applicable laws and regulations:

  • Anti-bribery and corruption, export control, and sanctions screening as part of due diligence.
  • Environmental and social responsibility where relevant to procurement decisions.

How to engage as a supplier

If you are a potential supplier or partner and would like to work with Mo Tech Security, please provide the following on first contact:

  • Company overview and primary contacts
  • High level service description, expected SLAs and pricing model
  • Relevant compliance certifications or audit summaries
  • Security posture summary (e.g., ISO/SOC reports, penetration test highlights, basic vulnerability scanning summary)

Send initial enquiries to the procurement team at support@motechsecurity.com or call +1-816-290-6512.

Contact

For supplier onboarding, audits, or questions about our Supplier Management program:

We welcome suppliers who share our commitment to security, quality, and continuous improvement.

Equipment Donate

Drop Off Computer and Technology Equipment Equipment Donate