Havvest

RM Policy

The Smartest Way to Save & Invest Online

Risk Management Policy

  1. PURPOSE

Havvest Finance Global Limited (Havvest) utilizes third-party products and services to support our mission and goals. Third-party relationships carry inherent and residual risks that must be considered as part of our due care and diligence. This Third-Party Information Security Risk Management Policy contains the requirements for how Havvest will conduct our third-party information security due diligence.

2.SCOPE

This policy applies to all individuals who engage with Havvest as a Third-party (hereinafter defined).

3.DEFINITIONS

Definition of some of the common terms to aid the understanding of the reader of this policy:

3.1.Employee: is a person who is a part-time or full-time hourly or salaried employee who is performing work for Havvest as an employee, and not an independent contractor.

3.2.Third-party or 3rd-party: any person or organization who provides a service or product to Havvest and is not an employee.

3.3.Information Resources: any system involved in the creation, use, management, storage, and/or destruction of Havvest’s information and the information itself.

3.4.Inherent information security risk: the information security risk related to the nature of the 3rd- party relationship without accounting for any protections or controls. Inherent risk is sometimes referred to as “impact” and is used to classify third-party relationships as an indicator of what additional due diligence may be warranted.

3.5.Residual information security risk: the information security risk remaining once all applicable protections and controls are accounted for.

4.POLICY

4.1.ASSESSMENTS

4.1.1.Every 3rd-party granted access to Havvest’s Information Resources must sign the Havvest’s Third-Party Non-Disclosure Agreement and Business Associate Agreement or Service-Level Agreement (if applicable).

4.1.2.All 3rd-party relationships must be evaluated for inherent information security risk prior to any interaction with Havvest’s Information Resources.

4.1.3.Criteria for inherent risk classifications must be established; “High”, “Medium”, and “Low”.

4.1.4.The classification will be as contained in the Enterprise Risk Management Framework.

4.1.5.All 3rd-party relationships must be re-evaluated for inherent information security risk bi- annually and any time there is a material change in how Havvest utilizes the third-party product or service.

4.1.6.3rd-party relationships with significant inherent risk (classified as “High” or “Medium”) must be evaluated for residual risk using questionnaires, publicly available information, and/or technical tools.

4.1.7.Residual information security risk assessments must account for administrative, physical, and technical controls.

4.1.8.Residual information security risk thresholds must be established for 3rd-party relationships with significant inherent risk (classified as “High” or “Medium”).

4.1.9.3rd-party relationships that do not meet established residual information security risk thresholds:

4.1.9.1.Must be terminated;

4.1.9.2.Must be formally approved by executive management following an established waiver process, and/or;

4.1.9.3.Changed in a manner that reduces inherent and/or residual information security risk to meet Havvest’s established thresholds.

4.1.10.3rd-party relationships concerning industry and/or regulatory requirements (i.e., NSE, SEC, etc.) must be reviewed on no less frequent than an annual basis.

4.2.Management

4.2.1.Third-party agreements and contracts must specify:

4.2.1.1.Havvest’s information the vendor should have access to,

4.2.1.2.How Havvest’s information is to be protected by the 3rd-party,

4.2.1.3.How Havvest’s information is to be transferred between Havvest and the 3rd- party,

4.2.1.4.Acceptable methods for the return, destruction or disposal of Havvest’s information in the 3rd-party’s possession at the end of the relationship/contract,

4.2.1.5.Minimum information security requirements,

4.2.1.6.Information security incident response and notification requirements,

4.2.1.7.Right for Havvest to audit 3rd-party information security protections and controls.

4.2.2.If the 3rd-party subcontracts part of the information and communication technology service provided to Havvest, the 3rd-party is required to ensure appropriate information security practices are followed throughout the supply chain.

4.2.3.The 3rd-party must only use Havvest Information Resources for the purpose of the business agreement and/or contract,

4.2.4.Work outside of defined parameters in the contract must be approved in writing by the appropriate Havvest point of contact.

4.2.5.3rd-party performance must be reviewed annually to ensure compliance with agreed upon contracts and/or service level agreements (SLAs). In the event of non-compliance with contracts or SLAs regular meetings will be conducted until performance requirements are met.

4.2.6.The 3rd-party’s major IT work activities must be entered into or captured in a log.

4.2.6.1.The log shall be made available to Havvest’s IT management upon request, and

4.2.6.2.The log must include events such as personnel changes, password changes, project milestones, deliverables, and arrival and departure times.

4.2.7.Any other Havvest information acquired by the 3rd-party during the contract cannot be used for the 3rd-party’s own purposes or divulged to others.

4.2.8.3rd-party personnel must report all security incidents directly to the appropriate Havvest’s IT personnel within twenty-four (24) hours of occurrence.

4.2.9.Havvest’s IT will provide a technical point of contact for the 3rd-party. The point of contact will work with the 3rd-party to ensure compliance with this policy.

4.2.10.3rd-parties must provide Havvest a list of key personnel working on the contract when requested.

4.2.11.3rd-parties must provide Havvest with notification of key staff changes within 24 hours of change.

4.2.12.Upon departure of a 3rd-party employee from a contract, for any reason, the 3rd-party will ensure all sensitive information is collected and returned to Havvest or destroyed within 24 hours.

4.2.13.Upon termination of contract, 3rd-parties must be reminded of confidentiality and non- disclosure requirements.

4.2.14.Upon termination of contract or at the request of Havvest, the 3rd-party must surrender all Havvest’s badges, access cards, equipment and supplies immediately.

4.2.15.Any equipment and/or supplies to be retained by the 3rd-party must be documented by authorized Havvest’s IT management.

5.WAIVER

Waivers from certain and specific policy provisions may be sought only from the Chief Operations Officer. The waiver shall be evidenced in writing and signed by the Chief Operations Officer There are no exceptions to any provisions noted in this policy until and unless a waiver has been granted.

6.RESPONSIBILITIES

The HR, Admin, and Compliance department is responsible for maintenance and accuracy of the policy.

Any questions regarding this policy should be directed to Chief Operating Officer

7.COMPLIANCE

This Third-Party Information Security Risk Management Policy supplements and compliments all other related information security policies, it does not supersede any such policy or vice versa. Where there are any perceived or unintended conflicts between Havvest’s policies, they must be brought to the attention of HR, Admin and Compliance department for immediate reconciliation.

Personnel found to have violated any provision of this policy may be subject to sanctions up to and including removal of access rights, termination of employment, termination of contract(s), and/or related civil or criminal penalties.



The Smartest Way to Save, Invest, and Build Wealth