Third-Party Risk

Vendor and Platform Governance

A protocol for choosing, reviewing, and exiting third-party tools. Spiralism cannot protect its archive, members, donors, chapters, or public voice if its infrastructure quietly belongs to vendors no one has reviewed.

Every useful institution depends on outsiders: registrars, web hosts, email providers, payment processors, donor platforms, CRMs, cloud drives, AI vendors, transcription tools, forum platforms, plugins, analytics, and open-source packages. Dependency is not failure. Unreviewed dependency is failure.

Vendor governance is how the institution keeps convenience from becoming capture.

The Rule

No vendor receives trust by default.

Before a platform or tool becomes institutional infrastructure, the institution should know:

If no one can answer those questions, the tool is experimental, not approved.

Vendor Classes

Classify each vendor before use.

Class Examples Default review
Public utility public web search, public source databases, public design references light review
Communication email, newsletter, forum, Discord, social scheduling privacy and moderation review
Archive infrastructure storage, backup, transcription, metadata, checksum tools privacy, security, succession review
Financial payment processor, donor platform, accounting, bank integration finance and conflict review
Member record CRM, mailing list, event registration, chapter records privacy and access review
AI vendor model provider, transcription, summarization, agent platform, companion tool AI-use, privacy, prompt, and retention review
Code/plugin package, extension, MCP server, CMS plugin, automation connector technical and supply-chain review
High consequence legal, safeguarding, complaint, youth, care, donor, identity, credential tools board or designated officer approval

The class can change over time. A chat tool becomes high consequence when it receives safeguarding reports. A public AI tool becomes high consequence when members paste testimony into it.

Approval Checklist

Before approval, record:

Vendor/tool:
Purpose:
Owner:
Account email:
Admin roles:
Data touched:
Data classification:
AI training/model-improvement terms:
Retention/export terms:
Breach/security notice terms:
Payment terms:
MFA/SSO support:
Deletion/exit path:
Backup owner:
Review date:
Approved by:

The checklist should live in the institutional tool register, not in one founder’s memory.

Public-facing vendor register fields are governed in Transparency and Public Registers.

Data Questions

Ask every vendor:

  1. What data is collected?
  2. Where is it stored?
  3. Who can access it?
  4. Is it used for training, model improvement, analytics, resale, or product development?

  5. Can data be deleted?

  6. Can data be exported in a usable format?
  7. How long are logs retained?
  8. What happens when an account is closed?
  9. What breach notice does the vendor provide?
  10. Does the vendor rely on subcontractors that touch the data?

If the vendor cannot answer basic data questions, do not use it for restricted or highly restricted material.

AI Vendor Review

AI vendors need extra review because generated systems can transform, retain, infer, summarize, and route sensitive material.

Before approving an AI vendor, answer:

Approval of an AI vendor does not approve every use. The workflow still needs the traffic-light review in AI Literacy and Use Protocol.

Supply Chain Rules

For code, plugins, packages, browser extensions, MCP servers, automations, and connectors:

Software supply-chain risk is not only a large-company problem. A small institution can lose its archive, accounts, or donor records through one over-permissioned plugin.

Capture Risks

A vendor captures the institution when leaving becomes too costly.

Capture signals:

For high-value systems, maintain an exit plan before the institution becomes dependent.

Exit Plan

Every important vendor needs an exit plan.

Record:

Exit plans should be tested for domains, email, archive storage, payment processors, CRM, newsletter, and AI workspaces.

Quarterly Review

Each quarter, review:

Remove what is no longer needed. A tool that no one owns is a risk.

Spiralism Policy

Spiralism should maintain a public-facing posture of tool humility: platforms are useful, but the archive and institution must outlive any one vendor.

No vendor may receive restricted testimony, minor material, donor records, incident notes, care-circle records, credentials, or private companion logs unless privacy, security, retention, consent, export, and breach-notice terms have been reviewed and approved.

This protocol pairs with:

Sources Checked