

Definitive Guide for Compliance Leaders
Vendor failures are now board-level risks. Regulators, shareholders, and customers demand audit-ready evidence that third-party vendors are being assessed, monitored, and managed.
A Vendor Risk Assessment Template provides the structure needed to evaluate vendors consistently across compliance, cybersecurity, financial stability, and operational resilience.
This guide is designed for compliance officers, procurement leaders, CFOs, legal counsels, and risk managers who must balance regulatory obligations with practical oversight.
Key takeaways:
A risk assessment template is not paperwork – it is your strongest defence in audits, investigations, and regulatory scrutiny.
A structured checklist prevents tick-box assessments, replacing them with measurable, repeatable, and board-reportable processes.
Mapping the template to frameworks like NIST, ISO 27001, GDPR, and HIPAA ensures compliance evidence is readily available.
Without disciplined vendor risk assessment, organisations expose themselves to significant financial, legal, and reputational harm.
Vendor risk is no longer an operational matter buried in procurement or IT. It is a strategic exposure that regulators, auditors, and boards are actively scrutinising.
The cost of failure:
Regulatory backdrop:
Boards, regulators, and auditors now expect organisations to demonstrate:
Vendor risk oversight is no longer optional. It is a regulatory expectation and a fiduciary duty.
A vendor risk assessment must be more than a formality. It should operate as a repeatable control framework, anchored in governance and capable of standing up to regulatory or audit scrutiny.
Every assessment should follow a lifecycle approach:
Accountability must be non-negotiable. A RACI table clarifies who does what:
Without explicit ownership, assessments degrade into checklists that nobody enforces.
Metrics give weight to the framework. Boards and regulators want evidence that the process is not symbolic. Typical measures include:
This framework ensures that a Vendor Risk Assessment Template is not an isolated form, but part of a controlled, monitored lifecycle with governance evidence at every stage.
A vendor risk assessment template must translate into repeatable workflows that compliance teams can execute without ambiguity. Below is a structured operational playbook.
Collect baseline data before scoring risk.
Checklist anchor: Insert “General Vendor Information” section from the downloadable template.
Test alignment with laws and standards.
Practical note: A certificate is not proof. Always request scope documents and expiration dates.
Evaluate technical safeguards and governance.
Checklist anchor: Use the “Cybersecurity & Data Protection” section of the template.
A financially unstable vendor is a systemic risk.
Quick win: Require evidence of BCP testing at least annually.
Regulators and investors increasingly demand ESG accountability.
Checklist anchor: ESG & Ethics section in the template.
Apply a transparent scoring rubric:
Escalate Critical vendors for leadership approval before engagement.
Vendor risk is not static. Build monitoring cadence into contracts.
Anti-pattern warning: One-time onboarding assessments create a false sense of security.
This operational playbook ensures the Vendor Risk Assessment Template is not just a file sitting in a policy binder—it is a living control embedded into procurement and compliance workflows.
A vendor risk assessment template is only as strong as the controls behind it. Too many organisations fall into the trap of policy theatre—beautiful documents, no operational muscle. Below are controls that have proven effective in real-world audits and crisis events.
These are non-negotiable safeguards applied during vendor selection and onboarding.
Blunt truth: Preventive controls reduce regulatory exposure. Weak contracts and unchecked onboarding are the fastest paths to board-level failures.
Even the best-prepared vendors will face incidents. Detective measures ensure you are not the last to know.
Example metric: % of critical vendors with up-to-date monitoring data.
When failures occur, corrective measures decide whether regulators see negligence or control.
What matters most: Regulators don’t expect perfection. They expect evidence that breaches were contained, reported, and lessons embedded.
Compliance Insight: Controls are not static. Each preventive, detective, and corrective measure must be tested, evidenced, and updated as vendor risk evolves.
Even the most sophisticated vendor risk assessment templates collapse when applied poorly. Below are red flags that signal the programme is drifting into failure.
Compliance Insight: Regulators can forgive technical gaps. They rarely forgive governance failures where an organisation knew—or should have known—risks existed and chose not to act.
A vendor risk assessment template only proves its worth if it generates evidence that can stand up in front of auditors, regulators, and the board. Risk management without evidence is simply hope dressed as policy.
Every assessment cycle should generate a consistent evidence pack. Minimum inclusions:
Audit Tip: A questionnaire without supporting evidence is a red flag. Regulators will assume you accepted vendor claims without validation.
Executives and boards will not read assessment files line by line. They need clarity at a glance. A well-designed dashboard demonstrates active oversight.
Key board-level views:
If a regulator walked in tomorrow, you must be able to hand them a defensible file showing how vendors were assessed, rated, and monitored with clear board oversight.
A vendor risk assessment template has little value unless it is operationalised. The following roadmap provides a phased path: immediate stabilisation, medium-term structure, and long-term maturity.
Objective: Establish a baseline and demonstrate immediate accountability.
Quick win: Even a partial vendor review shows auditors and boards that the process has begun with urgency.
Objective: Move from ad-hoc assessments to a repeatable framework.
Quick win: Visible dashboards with traffic-light indicators demonstrate to boards that vendor risk is being managed at scale.
Objective: Transition from manual processes to scalable oversight.
Quick win: Use regulatory frameworks as alignment proof to satisfy auditors and reassure directors.
Objective: Make vendor risk oversight defensible, auditable, and value-adding.
Milestone outcome: The organisation demonstrates a defensible, board-level vendor risk management programme, with evidence that withstands regulatory inspection.
The difference between a template and a mature programme is discipline. Quick wins build credibility, structured governance sustains it, and long-term automation makes it resilient.
This sample VRA Checklist provides a structured framework to evaluate vendors across compliance, security, financial, and operational dimensions. It is designed for compliance teams, procurement leaders, and risk managers who require a practical, audit-ready tool.
Use this checklist during vendor onboarding, periodic reviews, and offboarding to ensure consistent third-party risk oversight. This template should be customised to align with your organisation’s risk appetite, regulatory obligations, and industry context.
Download the Vendor Risk Assessment Template and turn vendor risk into a controlled, repeatable process today.
Every vendor you onboard is either strengthening your resilience—or quietly adding hidden exposure. Use this operational playbook and checklist not as theory, but as a live control you can run today. Build discipline into your procurement, prove audit readiness, and gain leadership confidence by showing vendor risk is being managed with precision.
👉 Download the full Vendor Risk Assessment Template now and put it into practice before the next audit or board review.
Templates are only powerful when adapted to your context. If you want a practical walkthrough of how to embed this vendor risk assessment framework into your procurement and compliance workflows, let’s talk. Our team can show you how to tailor the playbook, automate monitoring, and align with regulatory expectations.
👉 Schedule A Discovery Call with our experts today and turn vendor risk management into a competitive advantage.
A Vendor Risk Assessment Template is a standardised framework used to evaluate the risks associated with third-party vendors. It ensures every vendor is assessed consistently across compliance, cybersecurity, financial stability, and operational resilience.
The template typically includes a Vendor Risk Assessment Questionnaire, scoring rubrics, and a Vendor Risk Assessment Checklist that map back to established frameworks such as NIST, ISO 27001, GDPR, and HIPAA.
For compliance leaders and boards, it provides audit-ready evidence that vendor oversight is systematic, measurable, and aligned with broader Vendor Risk Management strategies — not a one-off or subjective exercise.
The frequency of a Vendor Risk Assessment depends on the vendor’s criticality. Critical or high-risk vendors handling sensitive data or regulated services should be reassessed annually using a Vendor Risk Assessment Template and monitored continuously. Medium-risk vendors may require review every 18–24 months, while low-risk vendors can often be reassessed at renewal. Best practice in Vendor Risk Management also includes ongoing monitoring for cybersecurity, compliance, and financial indicators.
A strong Vendor Risk Assessment Checklist should specify the review cadence by vendor tier, so regulators see evidence that risks are managed continuously, not just at contract signing.
A Vendor Risk Assessment Questionnaire should cover five domains:
General information – ownership, geography, subcontractors.
Compliance posture – certifications (ISO, SOC, GDPR, HIPAA), audit history.
Cybersecurity controls – encryption, access controls, incident response readiness.
Financial/operational stability – audited accounts, BCP/DRP, insurance coverage.
ESG and ethics – anti-bribery, sustainability, labour practices.
When aligned to a NIST vendor risk assessment questionnaire, it goes further by mapping technical security controls directly to the NIST Cybersecurity Framework. Questionnaires should require documented evidence, not just vendor self-attestation, ensuring the Vendor Risk Assessment Template produces audit-proof outcomes.
A Vendor Risk Assessment Checklist is a high-level tool used to verify that all risk domains have been covered — compliance, cybersecurity, financial health, ESG, and operational resilience. It works as a yes/no validation step and ensures consistency across vendors.
In contrast, a Vendor Risk Assessment Questionnaire digs deeper, requiring detailed vendor responses, supporting evidence, and alignment with standards such as NIST and ISO. Both are integral to a mature Vendor Risk Management programme: the checklist guarantees coverage and completeness, while the questionnaire provides the depth and defensibility regulators expect.
A third-party risk assessment example might involve onboarding a cloud vendor processing customer data. The organisation issues a Vendor Risk Assessment Questionnaire that tests for compliance certifications (ISO 27001, GDPR), cybersecurity measures (penetration testing, encryption), and resilience plans (disaster recovery).
Using the Vendor Risk Assessment Template, findings are scored in a risk matrix and mapped to a Vendor Risk Assessment Checklist. If high risks are identified — such as lack of incident response testing — remediation steps are required before renewal. This process shows regulators and auditors that risks were identified, prioritised, and addressed within a structured Vendor Risk Management framework.
A Vendor Risk Assessment Template ensures that third-party oversight is not ad hoc but structured and repeatable. Regulators increasingly expect organisations to evidence how they evaluate vendors, particularly in sectors handling sensitive data or regulated services. Without a documented template, risk assessments vary by department and are often incomplete.
Using a template provides audit-ready documentation, consistency across procurement and compliance functions, and alignment with frameworks like NIST and ISO. It also enables the board to see a clear picture of vendor risks, supported by a Vendor Risk Assessment Checklist and questionnaire outputs.
Vendor Risk Management (VRM) is the broader programme that governs how an organisation identifies, monitors, and mitigates third-party risks.
A Vendor Risk Assessment Template is the operational tool within VRM that structures the evaluation of each vendor. By embedding templates, organisations can ensure that every vendor — from IT providers to logistics partners — is scored against the same criteria. The outputs feed into dashboards and KRIs, giving leadership visibility.
Without templates, VRM programmes risk becoming inconsistent, leaving audit gaps. Templates also help tier vendors and schedule reassessments, making VRM measurable rather than symbolic.
A NIST vendor risk assessment questionnaire is a set of structured questions aligned with the NIST Cybersecurity Framework. It examines vendor practices in identity and access management, data protection, detection capabilities, incident response, and recovery planning.
Unlike generic questionnaires, NIST-aligned questions ensure technical and governance controls map back to a recognised standard. This makes assessments more defensible during audits. Incorporating such a questionnaire into a Vendor Risk Assessment Template ensures vendors are tested against baseline best practices.
It is especially valuable for regulated industries, where boards and auditors expect risk evaluations to tie back to established frameworks.
Tiering is essential because not all vendors pose equal risk. A Vendor Risk Assessment Template should include a scoring system that evaluates both the likelihood of a vendor-related incident and the potential impact on the business. For example:
Critical vendors: direct access to sensitive data or core services.
High-risk vendors: material impact but some redundancy exists.
Medium-risk vendors: support services with limited regulatory exposure.
Low-risk vendors: non-critical or commodity suppliers.
Once tiered, vendors can be assigned appropriate assessment depth and review cadence. This prevents wasted effort on low-risk providers while ensuring critical partners receive detailed questionnaires and monitoring.
Evidence separates serious oversight from tick-box compliance. A Vendor Risk Assessment Template should mandate collection of:
Each evidence item should be reviewed and logged in the Vendor Risk Assessment Checklist to demonstrate completion. Regulators increasingly demand not just vendor declarations but documented proof. Without evidence, a questionnaire alone will not withstand scrutiny.
A template is incomplete without a remediation section. After completing the Vendor Risk Assessment Questionnaire, identified issues should be logged with severity ratings, deadlines, and assigned owners.
The Vendor Risk Assessment Template should include a remediation log to ensure issues are not forgotten. For critical gaps, escalation to leadership is mandatory. Boards expect to see not only the identification of risks but proof of follow-up. Tracking can be done in spreadsheets, GRC tools, or dashboards, but what matters most is evidence that remediation is actively managed. Without this, risk assessments lose their credibility.
Common mistakes include:
A Vendor Risk Assessment Checklist should be concise, risk-tiered, and tied to a broader Vendor Risk Management framework. Overly long checklists discourage vendors, while overly short ones miss critical controls. Balance is key: enough detail to satisfy auditors but simple enough to be operationally efficient.
Under laws like GDPR and HIPAA, organisations are directly responsible for the actions of their vendors. A Vendor Risk Assessment Template ensures structured questions are asked about data handling, security measures, and privacy impact assessments. For GDPR, it verifies lawful processing, cross-border transfer safeguards, and breach notification timelines. For HIPAA, it checks for business associate agreements, PHI safeguards, and audit trails. Templates provide evidence of due diligence, which regulators increasingly expect during investigations. Without them, organisations are vulnerable to penalties if vendors mishandle sensitive data.
Modern regulators and investors increasingly demand ESG accountability in the supply chain. A Vendor Risk Assessment Template should include an ESG section covering anti-bribery, sustainability, labour rights, and diversity practices. A Vendor Risk Assessment Checklist can flag whether vendors have published sustainability goals or anti-corruption policies. While ESG oversight is newer than cybersecurity or financial checks, boards now expect evidence that vendors are screened for ethical risks. ESG failures can cause reputational harm equal to a data breach, making ESG assessment a necessary dimension of Vendor Risk Management.
Without a structured template, vendor oversight becomes inconsistent and unverifiable. Different departments may ask different questions, leaving critical risks unaddressed. In audits, the absence of a Vendor Risk Assessment Template makes it difficult to prove that due diligence was conducted systematically. Regulators and boards will see this as negligence. The consequences include fines, reputational damage, service disruptions, and legal liability. Templates provide the defensibility required when explaining vendor oversight decisions to auditors, stakeholders, or regulators. In today’s regulatory environment, not using a template is effectively indefensible.
Boards do not complete assessments themselves but must receive risk-based reporting. A Vendor Risk Assessment Template feeds into dashboards that show the percentage of vendors assessed, distribution of risk tiers, and status of remediations. Boards should be informed quarterly of high-risk vendor issues, with escalation protocols if remediation fails. Their role is to ensure oversight and hold management accountable for vendor governance. A robust Vendor Risk Management framework always includes board visibility, with templates providing the underlying evidence that risks are being identified, scored, and addressed consistently.
While the fundamentals of a Vendor Risk Assessment Template are consistent (compliance, security, financial, operational, ESG), the depth of questioning varies by industry. Healthcare vendors must meet HIPAA; financial vendors must demonstrate DORA or SOX compliance; defence vendors may require export control certifications.
A strong template allows customisation by industry while maintaining a common core. This balance ensures consistency for auditors while providing flexibility for sector-specific obligations. Standardisation at the framework level (e.g. mapping to NIST vendor risk assessment questionnaires) allows organisations to benchmark vendors across industries.
A Vendor Risk Assessment Template provides the baseline at onboarding, but continuous monitoring ensures that vendor risks remain under control. Cybersecurity scores, financial health indicators, and regulatory alerts should feed into ongoing monitoring dashboards. This allows organisations to detect deterioration before renewal cycles.
For example, a vendor with a strong onboarding score may face financial distress a year later — continuous monitoring ensures this is caught in real time. Without it, organisations operate blind between reviews. Modern Vendor Risk Management programmes combine templates with continuous monitoring for resilience.
financial crime compliance
financial crimes compliance
what is financial crime compliance
financial crime and compliance
financial crime and compliance management
financial crime compliance jobs
financial crime compliance solutions
financial crimes compliance jobs
compliance and financial crime
cost of financial crime compliance
enterprise financial crimes compliance
fcc financial crime compliance
anti financial crime compliance
conduct financial crime and compliance
financial crime compliance analyst
financial crime compliance analyst salary
financial crime compliance certification
financial crime compliance course
financial crime compliance definition
financial crime compliance framework
financial crime compliance in banking
financial crime compliance meaning
financial crime compliance risk management
global financial crimes compliance
true cost of financial crime compliance global report
what is financial crimes compliance
Neotas Enhanced Due Diligence covers 600Bn+ Archived web pages, 1.8Bn+ court records, 198M+ Corporate records, Global Social Media platforms, and more than 40,000 Media sources from over 100 countries to help you screen & manage risks.
Download the Vendor Risk Assessment Template and turn vendor oversight into a repeatable, audit-ready workflow.
vendor risk assessment template
vendor risk assessment template xls
vendor risk assessment questionnaire template
vendor risk assessment template excel
vendor management risk assessment template
bank vendor risk assessment template
free vendor risk assessment template
vendor risk management assessment template
third-party vendor risk assessment template
thirdparty vendor risk assessment template
vendor risk assessment questionnaire template pdf
free vendor risk assessment questionnaire template
vendor risk assessment template equation
vendor risk assessment questionnaire template excel
it vendor risk assessment template excel
vendor risk assessment template pdf
third party vendor risk assessment template
vendor risk assessment template – excel
soc 2 vendor risk assessment template
vendor risk assessment report template
it vendor risk assessment template
free vendor risk assessment template xls
vendor risk assessment template free
vendor risk assessment template xls excel
vendor risk assessment software
customer and vendor risk assessment software
software for vendor risk assessment
compare vendor risk assessment software solutions
vendor risk assessment
vendor management risk assessment
vendor risk assessment software
vendor security risk assessment
vendor risk assessment tools
vendor risk assessment template
automated vendor risk assessment
vendor risk assessment process
3rd party vendor risk assessment
third party vendor risk assessment
customer and vendor risk assessment software
vendor risk assessment checklist
vendor risk assessment questionnaire
information security vendor risk assessment
vendor risk assessment report
vendor risk assessment matrix
third party vendor risk assessment example
risk assessment third party vendor
vendor risk assessment criteria
hipaa vendor risk assessment
vendor cyber risk assessment
vendor risk assessment for banks
vendor risk assessment example
what is vendor risk assessment
vendor risk assessment tool
vendor risk assessment template xls
risk assessment for vendor management
vendor risk assessment questionnaire pdf
nist vendor risk assessment questionnaire
vendor financial risk assessment
vendor risk assessment services
ai vendor risk assessment
what is a vendor risk assessment
vendor due diligence risk assessment
vendor risk assessment policy
how to perform vendor risk assessment
vendor risk assessment program
vendor risk assessment procedure
vendor risk assessment questionnaire template
vendor management risk assessment questionnaire
vendor management risk assessment matrix
vendor risk management assessment matrix
nist vendor risk assessment
vendor risk assessment template excel
vendor risk assessment framework
vendor information security risk assessment
vendor risk assessment servicenow
vendor management risk assessment template
bank vendor risk assessment template
free vendor risk assessment template
risk assessment vendor selection
health risk assessment vendor
healthcare vendor risk assessment
vendor risk assessment form
vendor risk assessment questionnare
vendor risk assessment questions
risk assessment vendor management
vendor risk management assessment template
vendor risk assessment jobs
bank vendor management risk assessment
risk assessment for vendor qualification
vendor risk assessment checklist xls
sample vendor risk assessment
compare vendor risk assessment tools using ai for public procurement contracts.
third-party vendor risk assessment
vendor risk assessment library
vendor risk assessment resume
vendor risk assessment definition
third-party vendor risk assessment template
thirdparty vendor risk assessment template
vendor management risk assessment sample
risk assessment thirdparty vendor
vendor cybersecurity risk assessment
continuous vendor risk assessment
third party vendor risk assessment questionnaire
vendor qualification risk assessment
vendor risk assessment pdf
third-party vendor risk assessment example
vendor risk assessment tools ai public procurement contracts
social media archive services this vendor can also provide risk assessment monitoring
vendor risk assessment best practices
thirdparty vendor risk assessment example
vendor risk assessment scorecard
vendor management risk assessment
vendor risk assessment report sample
vendor risk management assessment
vendor risk assessment audits
cbanc network vendor management risk assessment
vendor risk assessment, reasonable security
vra vendor risk assessment
vendor risk assessment tools tech vendor credibility
vendor risk assessment questionnaire template pdf
sample vendor risk assessment questionnaire
free vendor risk assessment questionnaire template
what is vendor risk assessment process?
vendor risk assessment template equation
vendor risk assessment (vra)
vendor risk assessment process steps
vendor risk assessment methodology
how to do a vendor risk assessment
vendor management risk assessment
risk assessment for vendor management
vendor management risk assessment questionnaire
vendor management risk assessment matrix
vendor risk management assessment matrix
vendor management risk assessment template
risk assessment vendor management
vendor risk management assessment template
bank vendor management risk assessment
vendor management risk assessment sample
vendor management risk assessment
vendor risk management assessment
network vendor management risk assessment
vendor risk management business risk assessment
vendor management risk assessment
risk assessment for vendor management
vendor management risk assessment questionnaire
vendor management risk assessment matrix
vendor risk management assessment matrix
vendor management risk assessment template
risk assessment vendor management
vendor risk management assessment template
bank vendor management risk assessment
vendor management risk assessment sample
vendor management risk assessment
vendor risk management assessment
network vendor management risk assessment
vendor risk management business risk assessment vendor management risk assessment
risk assessment for vendor management
vendor management risk assessment questionnaire
vendor management risk assessment matrix
vendor risk management assessment matrix
vendor management risk assessment template
risk assessment vendor management
vendor risk management assessment template
bank vendor management risk assessment
vendor management risk assessment sample
ffiec vendor management risk assessment
vendor risk management assessment
vendor management risk assessment
vendor risk management business risk assessment
vendor risk assessment
vendor management risk assessment
vendor risk assessment software
vendor security risk assessment
vendor risk assessment tools
vendor risk assessment template
automated vendor risk assessment
vendor risk assessment process
3rd party vendor risk assessment
third party vendor risk assessment
customer and vendor risk assessment software
vendor risk assessment checklist
vendor risk assessment questionnaire
information security vendor risk assessment
vendor risk assessment report
vendor risk assessment matrix
third party vendor risk assessment example
risk assessment third party vendor
vendor risk assessment criteria
hipaa vendor risk assessment
vendor cyber risk assessment
vendor risk assessment for banks
vendor risk assessment example
what is vendor risk assessment
vendor risk assessment tool
vendor risk assessment template xls
risk assessment for vendor management
vendor risk assessment questionnaire pdf
nist vendor risk assessment questionnaire
vendor financial risk assessment
vendor risk assessment services
ai vendor risk assessment
what is a vendor risk assessment
vendor due diligence risk assessment
vendor risk assessment policy
how to perform vendor risk assessment
vendor risk assessment program
vendor risk assessment procedure
vendor risk assessment questionnaire template
vendor management risk assessment questionnaire
vendor management risk assessment matrix
vendor risk management assessment matrix
nist vendor risk assessment
vendor risk assessment template excel
vendor risk assessment framework
vendor information security risk assessment
vendor risk assessment
vendor management risk assessment template
bank vendor risk assessment template
free vendor risk assessment template
An advanced Due Diligence Platform that leverages AI to join the dots between Social Media, Corporate Records, Adverse Media and Open Source Intelligence (OSINT).
Our platform offers the most advanced insights, so you can respond to risks immediately.
With insights spanning global jurisdictions, your business is never in the dark.
Whether you manage a small portfolio or a global enterprise, our platform adapts to your needs
Ready to Transform Your Third-Party Risk Approach?
| Cookie | Duration | Description |
|---|---|---|
| AWSALBTG | 7 days | AWS Application Load Balancer Cookie. Load Balancing Cookie: Used to encode information about the selected target group. |
| AWSALBTGCORS | 7 days | AWS Classic Load Balancer Cookie: Used to map the session to the instance. This cookie is identical to the original ELB cookie except for the attribute &SameSite=None; |
| cookielawinfo-checkbox-advertisement | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . |
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| CookieLawInfoConsent | 1 year | Records the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie. |
| debug | never | Cookie used to debug code and website issues |
| shown | session | Session cookie to control number of times a pop up is shown. |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
| Cookie | Duration | Description |
|---|---|---|
| __cf_bm | 30 minutes | This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. |
| AnalyticsSyncHistory | 1 month | Used to store information about the time a sync took place with the lms_analytics cookie |
| bcookie | 2 years | LinkedIn sets this cookie from LinkedIn share buttons and ad tags to recognize browser ID. |
| bscookie | 2 years | LinkedIn sets this cookie to store performed actions on the website. |
| lang | session | LinkedIn sets this cookie to remember a user's language setting. |
| lidc | 1 day | LinkedIn sets the lidc cookie to facilitate data center selection. |
| UserMatchHistory | 1 month | LinkedIn sets this cookie for LinkedIn Ads ID syncing. |
| Cookie | Duration | Description |
|---|---|---|
| li_gc | 2 years | Used to store consent of guests regarding the use of cookies for non-essential purposes |
| rl_anonymous_id | 1 year | Generates an unique anonymous Id to identify a user and attach to a subsequent event. |
| rl_user_id | 1 year | to store a unique user ID for the purpose of Marketing/Tracking |
| Cookie | Duration | Description |
|---|---|---|
| _ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
| _gat_gtag_UA_107495977_1 | 1 minute | Set by Google to distinguish users. |
| _gat_UA-107495977-1 | 1 minute | A variation of the _gat cookie set by Google Analytics and Google Tag Manager to allow website owners to track visitor behaviour and measure site performance. The pattern element in the name contains the unique identity number of the account or website it relates to. |
| _gcl_au | 3 months | Provided by Google Tag Manager to experiment advertisement efficiency of websites using their services. |
| _gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |
| attribution_user_id | 1 year | This cookie is set by Typeform for usage statistics and is used in context with the website's pop-up questionnaires and messengering. |
| CONSENT | 2 years | YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data. |
| Cookie | Duration | Description |
|---|---|---|
| _fbp | 3 months | This cookie is set by Facebook to display advertisements when either on Facebook or on a digital platform powered by Facebook advertising, after visiting the website. |
| fr | 3 months | Facebook sets this cookie to show relevant advertisements to users by tracking user behaviour across the web, on sites that have Facebook pixel or Facebook social plugin. |
| IDE | 1 year 24 days | Google DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile. |
| test_cookie | 15 minutes | The test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies. |
| VISITOR_INFO1_LIVE | 5 months 27 days | A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface. |
| YSC | session | YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages. |
| yt-remote-connected-devices | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
| yt-remote-device-id | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
| yt.innertube::nextId | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
| yt.innertube::requests | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |