Section 1 - Risk identification and evaluation
TELUS Digital has an AI Tool Inventory, where all tools involving AI are registered. Such Inventory is linked to a process where Information Security and Privacy aspects are also assessed. Privacy, Data & AI Governance then performs an assessment of the risks in line with the risk categories of the EU AI Act, based on the information provided by the business owner and other relevant stakeholders.
TELUS Digital employs several practices to identify and evaluate risks such as vulnerabilities, incidents, emerging risks, and misuse throughout the AI lifecycle. These practices are part of a comprehensive approach to security and risk management. Here are the key practices:
Vulnerability Management:
- Vulnerability assessments and/or penetration testing are conducted quarterly or more frequently as warranted by the sensitivity and security requirements of the business process.
- Commercial products and/or services are used to assess all network subnets and servers hosting TELUS Digital information.
- Information about technical vulnerabilities is obtained in a timely fashion, and the organization's exposure to such vulnerabilities is evaluated.
- Appropriate measures are taken to address associated risks.
Risk Classification: TELUS Digital classifies vulnerabilities into different risk levels:
- Severe: Vulnerabilities related to malware/exploit/zero-day that have been confirmed to affect devices in TELUS Digital infrastructure.
- Critical: Vulnerabilities classified as critical due to their impact on the infrastructure or by recommendation of the vendor of the affected asset.
- High, Medium, and Low: Vulnerabilities classified based on their impact and vendor recommendations.
Incident Management:
- TELUS Digital has a Security Incident plan and procedures defined by the TI Information Security Committee (TISSC).
- The incident response process includes six stages: Preparation, Identification, Containment, Eradication, Recovery, and Follow-up.
- A record of incidents is maintained, including a description of the breach, time period, consequences, reporter's name, to whom it was reported, and data recovery procedures.
Regular Testing and Evaluation:
- Processes are in place for regularly testing, assessing, and evaluating the effectiveness of technical and organizational measures to ensure the security of processing.
- Penetration tests are undertaken at appropriate intervals to ensure the integrity and confidentiality of relevant systems.
AI-Specific Considerations: TELUS Digital's approach to risk management extends to AI systems.
- Applying the vulnerability management and incident response processes to AI systems and infrastructure.
- Conducting regular assessments of AI models for potential biases, security vulnerabilities, or misuse potential.
- Implementing monitoring systems to detect anomalies or unexpected behaviors in AI systems.
Compliance and Privacy:
- TELUS Digital ensures compliance with various data protection regulations, including GDPR, CCPA, PIPEDA, and others.
- Privacy impact assessments are conducted for data processed as controllers, ensuring that AI systems handling personal data are evaluated for privacy risks.
Continuous Improvement:
- The organization maintains up-to-date policies and frameworks that demonstrate accountability.
- Security programs are implemented with effective governance and management structures to protect data, including senior management oversight.
Third-Party Risk Management:
- TELUS Digital has processes in place to evaluate and manage risks associated with third-party service providers and subprocessors, which would extend to any AI-related services or components provided by external parties.
TELUS Digital employs a comprehensive testing and evaluation framework to assess models/systems before moving them beyond the development stage. Here are the key practices:
Structured Testing Phase:
- A dedicated Software Quality Assurance and Testing Team conducts thorough testing in a separate environment from production
- Multiple testing methodologies are employed, including:
- Functional testing
- Integration testing
- End-to-end testing
- Acceptance testing
- Parallel testing
- Regression testing
- Stress testing
- String testing
- System testing
- Unit testing
Environment Separation and Controls:
- Strict separation between development/test and production environments
- Development and test systems are prohibited from running against operational databases
- Production data deemed confidential is prohibited in non-production environments unless specifically authorized
- Access controls enforce the separation between environments
- Separation of duties between personnel assigned to development/test and production environments
Quality Assurance Measures:
- Testing team employs functional tests to ensure:
- Expected functional requirements are met
- Security controls are present and operating properly
- Internal controls are functioning as intended
- Documentation of all corrections and modifications to maintain program integrity
- Validation of proper role-based access control (RBAC)
Security-Focused Testing:
- Testing of all security patches and system/software configuration changes before deployment
- Validation of:
- Input handling (to prevent cross-site scripting, injection flaws, malicious file execution)
- Error handling
- Secure cryptographic storage
- Secure communications
- Authentication mechanisms
Implementation Controls:
- Systems must pass acceptance criteria before moving to production
- Configuration and testing of system security parameters
- Parallel running of new and old systems to verify accuracy and reliability
- Post-implementation review to validate completion
- Documentation of any programming, procedural, or configuration changes made during the verification process
Change Management:
- All changes are controlled through a complete and robust configuration management process
- Changes must be approved and implemented in accordance with Change Management policy
- Analysis of potential security implications and possible risks
- Regular review and updates of configuration change control processes (at least yearly)
Continuous Evaluation:
- Regular testing, assessing, and evaluating the effectiveness of technical and organizational measures
- Testing the overall strength of defenses (technology, processes, and people) through simulated attacks
- Undertaking penetration tests at appropriate intervals to ensure system integrity and confidentiality
This comprehensive approach ensures that models and systems are thoroughly evaluated for functionality, security, and reliability before moving beyond the development stage. The process is designed to identify and address potential issues early in the development lifecycle while maintaining the separation between development and production environments to minimize risks.
TELUS Digital employs a comprehensive approach to risk evaluation, vulnerability management, and incident reporting. Here's a breakdown of the practices:
Quantitative and Qualitative Risk Evaluation Metrics:
TELUS Digital uses both quantitative and qualitative metrics for risk evaluation:
- Employs an automated risk assessment matrix for change requests, which calculates risk based on factors such as urgency, impact, complexity, and confidence.
- Risk levels are categorized as Low (<=2.5 average), Moderate (>2.5 & < 3.5 average), and High (>=3.5 average).
- Vulnerabilities are classified into severity levels: Severe, Critical, High, Medium, and Low, based on their potential impact on the infrastructure and vendor recommendations.
Vulnerability and Incident Reporting Mechanisms:
TELUS Digital has established accessible reporting mechanisms for a diverse set of stakeholders:
- Employees can report incidents through an online form or by emailing TI.Privacy.Office@telusinternational.com.
- The reporting process requires detailed information about the incident, including circumstances, data compromised, discovery time, location, cause, and affected individuals.
- A documented process ensures appropriate people are involved in investigating and controlling the incident.
- The Security Investigations Team evaluates reported incidents and initiates appropriate protocols.
- There's a dedicated Security Investigations Team that issues reports on privacy incidents.
Incentive Programs for Responsible Disclosure:
The focus is on establishing clear reporting mechanisms and fostering a culture of security awareness rather than providing external incentives.
TELUS Digital has a comprehensive approach to leveraging external expertise and managing third-party reporting mechanisms for risks and vulnerabilities:
External Independent Expertise:
TELUS Digital leverages external expertise in several ways:
- Annual audits by accredited trusted third parties following:
- ISO 27001 and ISO 27002 standards
- NIST 800-53 guidelines
- SSAE-18 Type II audits (when applicable)
- AICPA SysTrust audits (for non-financial services)
- External counsel involvement in:
- Risk assessments
- Incident response
- Legal due diligence
- Compliance evaluations
- Independent assurance reviews through:
- Internal Audit as the third line of defense
- External forensics investigators when required
- Regular vulnerability assessments and penetration testing by external parties
Third-Party Reporting Mechanisms:
TELUS Digital has established multiple channels for receiving reports of risks, incidents, or vulnerabilities:
- Formal incident reporting process through:
- Online reporting form
- Dedicated email channel (TI.Privacy.Office@telusinternational.com)
- Direct communication with the Privacy Office
- Service provider reporting requirements:
- Mandatory security incident response plans
- Immediate reporting of security breaches
- Regular status updates and attestations
Reporting Process Requirements:
For any incident report, the following information is required:
- Description of circumstances and individuals involved
- Details of compromised data
- Discovery time and location
- Cause of the incident
- Number and nature of affected individuals/organizations
- Immediate containment measures taken
Multi-Stakeholder Response Process:
The organization involves various stakeholders in the risk evaluation process:
- TI Security Investigations Team evaluates and reports on technical aspects
- Privacy Office assesses and initiates appropriate protocols
- External counsel provides legal guidance
- Communications team manages stakeholder communications
- Third-party forensics experts when needed
Documentation and Follow-up:
After receiving reports:
- Formal documentation of all incidents and responses
- Regular risk assessments (at least every two years or upon significant business changes)
- Post-incident analysis and lessons learned
- Updates to policies and procedures based on findings
- Regular audits to verify effectiveness of controls
Continuous Improvement:
The organization maintains:
- Regular updates to risk assessment methodologies
- Periodic review of reporting mechanisms
- Integration of lessons learned into future processes
- Training updates based on identified gaps
- Policy revisions based on audit findings
This comprehensive approach ensures that TELUS Digital not only leverages external expertise effectively but also maintains robust mechanisms for receiving and acting on reports from various stakeholders. The organization's multi-layered approach to risk management, combining internal controls with external validation and expertise, helps ensure comprehensive risk identification and mitigation.
TELUS Digital actively uses and implements international technical standards and best practices for risk identification, assessment, and evaluation, though the available documentation focuses more on implementation of standards rather than direct contributions to development:
Implementation of International Standards:
- ISO Standards:
- Follows ISO 27001 and ISO 27002 standards for information security management
- Uses these standards as the basis for audit methodology and compliance verification
- Maintains certification and updates policies to align with latest ISO standards (e.g., ISO 27001-2013)
Integration of Multiple Framework Standards:
- Implements a multi-framework approach by mapping controls across:
- NIST 800-53 Controls (updated to Version 5)
- HI Trust Framework
- PCI DSS Standards
- HIPAA Requirements
- ISO 27001 Controls
Best Practices Implementation:
- Incorporates industry best practices into various areas:
- Network security operations
- Application security (e.g., OWASP for web applications)
- Vulnerability assessment and remediation
- Security configuration management
- Risk assessment methodologies
Standards-Based Security Controls:
- Implements technical and organizational measures based on international standards:
- Continuous vulnerability assessment and remediation
- Security configuration management
- Access control systems
- Incident response protocols
- Data protection measures
Compliance and Verification:
- Regular audits by accredited third parties to verify compliance with:
- International standards
- Industry best practices
- Regulatory requirements
- SSAE-18 Type II audits when applicable
- AICPA SysTrust audits for specific scenarios
Documentation and Policy Alignment:
- Maintains documentation aligned with international standards
- Regular updates to policies and procedures to reflect changes in international standards
- Integration of standards into operational procedures and risk assessment methodologies
Risk Assessment Framework:
Uses standardized approaches for:
- Vulnerability severity rating
- Risk impact assessment
- Security control implementation
- Incident response procedures
TELUS Digital employs a multi-faceted approach to collaborate with relevant stakeholders across sectors for assessing and adopting risk mitigation measures, including addressing systemic risks:
- Cross-Sector Collaboration:
- TELUS Digital engages with various external parties, including legal counsel, forensic specialists, data breach resolution firms, and public relations experts.
- TELUS Digital establishes relationships with breach remediation vendors across different specialties, indicating a cross-sector approach to risk mitigation.
- Stakeholder Engagement:
- The company involves multiple internal stakeholders in risk assessment and incident management, including the Privacy Office, Information Security Staff, IT Team, Law & Governance Team, and Operations/HR.
- External stakeholders such as customers, regulatory bodies, and law enforcement are also engaged when necessary.
- Information Sharing:
- TELUS Digital has established protocols for sharing incident information with relevant parties, including affected individuals, media, privacy authorities, and other third parties like card issuers and banks.
- TELUS Digital maintains a centralized channel for reporting breaches, facilitating efficient information flow.
- Collaborative Risk Assessment:
- The company conducts corruption risk assessments that consider factors such as the country of business, potential business partners, and the nature of proposed projects or transactions.
- This suggests a holistic approach to risk assessment that likely includes consideration of systemic risks.
- Industry Standards and Best Practices:
- TELUS Digital adheres to international standards and best practices, implying participation in broader industry efforts to address common risks.
- They implement multiple framework standards, including ISO, NIST, HI Trust, PCI DSS, and HIPAA, which often address systemic risks within their respective domains.
- Vendor Management:
- The company has a robust vendor management process, including due diligence checks and risk assessments of third parties.
- This approach helps mitigate systemic risks that might arise from the supply chain or partner ecosystems.
- Continuous Improvement:
- TELUS Digital regularly updates its policies and procedures based on lessons learned from incidents, indicating an adaptive approach to risk management.
- They conduct post-incident reviews and formal audits, which likely contribute to identifying and addressing systemic risks.
- Legal and Regulatory Compliance:
- The company collaborates with external counsel and regulatory bodies to ensure compliance with legal requirements, which often address systemic risks at an industry or national level.
- Knowledge Sharing:
- TELUS Digital maintains relationships with outside counsel prior to incidents, suggesting ongoing dialogue and knowledge exchange about potential risks and mitigation strategies.
No answer provided


























