Our security rules apply to all suppliers who work with us.
To become a Zup supplier, all providers are required to complete an Information Security questionnaire. The responses are analyzed to determine compliance with our security policy and rules for the entire service process.
– All questions must be answered;
– Additional information or documents may be requested if necessary;
– The required evidence must be sent along with this form; failure to provide evidence may affect the timeframe for our analysis and response.
At Zup, we take security very seriously. One of our cultural pillars is: We are security guardians. From the very beginning, we have been educating and guiding zuppers towards the best security practices.
Our development process incorporates quality assurance steps to make sure our environment, products and customers are always secure. Nevertheless, when complex technology products are involved, the possibility of security vulnerabilities cannot be ruled out.
SecGov, our dedicated Information Security and Governance team, conceived this program to encourage responsible examination and detection of security issues and vulnerabilities at Zup.
Contributions from the community play a vital role in enhancing the security of the tech environment. If you find a bug, cybersecurity risk or vulnerability in any of our products or environment, this is the proper channel to alert us.