Email templates will save you considerable amount of time when sending an invitation to connect with a vendor, customer, or when inviting new team members to the platform.
To access the Email Templates settings, click on the Settings icon and go to the Messaging tab.
Creating a New Template
To create a new template, click on the +Add button in the Templates Settings section, assign a title to the template, add the applicable subject line and message and click on the Submit button.
Editing an Existing Template
Look for the corresponding template in the Templates Settings section, and select the Pencil icon. Make all the necessary changes, and select Submit.
Removing an Existing Template
Look for the corresponding template in the Templates Settings section, and select the Trash Can icon.
Email Template Examples
Here are some good examples to use to enforce compliance from your vendors.
Example 1: Complying with regulation
To Whom It May Concern,
ACME Company would like to inform you of a critical task that requires your prompt attention. This task is being assigned to you in order to comply with the New York Department of Financial Services (NYDFS) Cybersecurity Regulation, 23 NYCRR Part 500. As part of this regulation, we are required to conduct a risk assessment of our vendors and partners to ensure minimum cybersecurity practices are in place. Pursuant to our prospective or existing contract with you, you are required to comply with all applicable laws and regulations. To this end, we are reaching out to you as part of our due diligence to evaluate the adequacy of your cybersecurity practices.
We have made it very easy for our vendors and partners to submit a self-assessment by way of a cloud based platform by partnering with ThirdPartyTrust. Inside this platform, you will be able to easily manage and share your security profile information with us. By moving to this online solution, it will streamline the risk assessment process and make the ability to exchange your security profile information with us, easier and faster.
Completion of the security profile is required for all vendors within 20 business days. As part of our vendor management program, we require that all vendors complete their risk assessment profile in this specified time frame.
Please register as a user immediately after receiving the email invitation. Initial registration should take 10 minutes. If you are missing some information, you can enter it later.
Thank you for complying with this contractual and regulatory requirement, and for your support for what we believe will be a mutually beneficial process.
Chief Compliance Officer / Chief Information Security Officer / Chief Risk Officer
Example 2: Standard Introduction
To Whom It May Concern:
ACME Company is modernizing its vendor risk management process. We are moving to an online solution that will make the ability to exchange security profile information easier, faster, and more securely.
We are using the ThirdPartyTrust platform to assist us with the vendor risk management process. Inside the platform you will be able to manage your security profile information and share it with us as well as your other customers using ThirdPartyTrust who require similar information, if applicable. This platform will make it quick and easy to provide the required information.
If you have any questions, please contact or the send an email to: firstname.lastname@example.org
Manager, Information Security