Trust Center

Modern Slavery and Human Trafficking Policy

Last Updated: March 22, 2025 10:31 pm MDT

Zayo is a global organization whose activities and products include the delivery of communications infrastructure planning, service integration design, delivery and operation of dedicated optical communications and wavelength and network solutions to customer requirements.

Zayo Group is committed to the improvement of the environment surrounding its activities, products and services for the benefit of employees, customers and those within our sphere of influence.

Zayo is committed to prohibiting and driving out acts of modern day slavery and human trafficking within its business and its supply chains, including sub-contractors, and partners.

The Company acknowledges responsibility to the Modern Slavery Act 2015 and will ensure transparency within the organization and with suppliers of goods and services to the organization.

As part of the company’s due diligence processes into slavery and human trafficking, our supplier approval process incorporates a review of the controls undertaken by our suppliers. Imported goods from sources from outside the UK and EU are potentially more at risk for slavery/human trafficking issues. The level of management control required for these sources will be continually monitored.

The company will not support or deal with any business knowingly involved in slavery or human trafficking.

The company’s directors and senior management shall take responsibility for implementing this policy statement and its objectives and shall provide adequate resources (training, etc.) and investment to ensure that slavery and human trafficking is not taking place within the organization and within its supply chains.

A full copy of this policy and a copy of the Modern Slavery Act 2015 is accessible to all employees electronically and can be obtained from the Legal department upon request.

This Policy takes into account, and supports, the policies, procedures and requirements documented in our Integrated Management System, compliant with the requirements of ISO 9001, ISO 14001, and ISO 27001. The implementation and operation of this management system underlines our commitment to this policy. Formal procedures concerning slavery and human trafficking have been established, including disciplinary procedures where they are breached.

Additional procedures ensure that this policy is understood and communicated to all levels of the company, and that it is regularly reviewed to ensure its continuing suitability and relevance to the company’s activities.

The ultimate responsibility for slavery and human trafficking not taking place within the organization and its supply chain lies with the Managing Director, who will ensure that it is given equal priority with other major business objectives. Implementation of this policy is a line management responsibility at all levels together with participation of all employees.

This policy, supported by instructions, procedures, and organizational arrangements within Zayo Group, Zayo Europe, and their subsidiaries is to be applied to all activities, products and services carried out by the company. All directors, managers, supervisors, employees and subcontractors will enforce this policy.

The policy will be revised and updated as necessary.

FAQs

Select a topic to view FAQs by category.

  • Personnel Security

    Is a personnel security program implemented at Zayo?

    Yes.

    Is employee access managed by role?

    Yes.

    Are policies documented for conducting background checks of employees and contractors as permitted by each country in which you operate?  

    Yes.

    Is access to business-critical systems, manufacturing facilities, and assets formally managed and maintained?

    Yes.

    Does Zayo have a process for onboarding personnel?

    Yes.

    Does the process include security awareness training?

    Yes.

    What is the process to determine the level of access to company identifications (IDs), tokens, documents, applications, etc.?

    Zayo implements Role Based Access Controls. Access is granted based on job titles tied to roles.

    What is the process to distribute company assets?

    Assets are distributed based on roles and are determined by role-based access.

    Is the onboarding process documented?

    Yes.

    Does Zayo have policies for conducting background checks of your employees as permitted by the country in which you operate?

    Yes.

    How does Zayo conduct the background checks and document, validate, and update responses?

    This is performed by Human Resources using a third-party vendor.

    Does Zayo have policies for conducting background checks for your suppliers, as permitted by the country in which you operate?

    Zayo’s Third Party Risk Management (TPRM) program identifies each of its suppliers, the products/services of which they supply, risks and controls, and assessments. Per business practice, the TPRM program provides thoroughly vetted suppliers prior to onboarding.

    Does Zayo have policies for conducting background checks for any subcontractors, as permitted by the country in which you operate?

    Subcontractor companies are required to perform background checks on their subcontractors doing business with Zayo.

    Does Zayo have a process for offboarding personnel?

    Yes.

    Does the process include a process to transfer knowledge to other personnel?

    Yes.

    What is the process to remove access to all company documents, applications, assets, etc.?

    Access is revoked upon termination of user accounts.

    What is the process to recover all company assets?

    Upon termination of an employment contract or a change in employment, the User must return all organizational assets to the Service Desk, or the asset owner in coordination with the manager of the relevant team. All other information related to employment must be given to the Organization in accordance with the employee’s contract. In cases where an employee or Supplier uses their own personal equipment, the User must ensure that all internal use and confidential information are securely transferred to the Organization and securely erased from their personal machine after termination.

    Are personnel security practices formally documented and accessible to all employees?

    Yes.

    Are Personnel Security practices routinely enforced, audited, and updated?

    Yes.

    Are all personnel trained in security best practices?

    Yes, and it includes, but is not limited to insider threats, access control, and data protection.

    Is there additional security training provided to users with elevated privileges?

    Yes.

    Does Zayo have a Code of Conduct for its employees, suppliers and subcontractors?

    Yes.

    Is the Code of Conduct always available and visible to Zayo employees, suppliers, and subcontractors?

    Yes.

    How often is this Code of Conduct updated?

    Annually or as needed

    Does Zayo have personnel designated to address questions or violations to the Code of Conduct?

    Yes.

    Are these employees, suppliers, and subcontractors trained on the Code of Conduct, including privacy and confidentiality requirements, as required by your industry?

    Yes.

  • Third Party and Supply Chain Management

    Does Zayo have a formal process for ensuring supply chain resilience as part of its product offering TPRM practices?

    Yes.

    Does Zayo consider non-technical supply chain resilience threats such as weather, geo-political instability, epidemic outbreak, volcanic, earthquakes, etc.?

    Yes.

    Does Zayo maintain a formally trained and dedicated crisis management team, including on-call staff, assigned to address catastrophic or systemic risks to your supply chain or manufacturing processes?

    Yes.

    Does Zayo require and audit key suppliers for their ability to be prepared for unexpected supply chain disruptions?

    Yes.

    Do Zayo service deliverables outline which services can be done remotely and which cannot?

    Yes, and these are documented in Service Level Agreements (SLAs) or Terms and Conditions.

    Does Zayo consider supplier diversity to avoid single sources and to reduce the occurrence of suppliers being susceptible to the same threats to resilience?

    Yes.

    Does Zayo consider alternate offering delivery channels to mitigate extended supplier outages to include cloud, network, telecommunication, transportation, and packaging?

    Yes.

    Do you maintain inventory of key suppliers with access to systems or data?

    A vendor list mechanism exists, covers all vendors, and is updated as the Organization changes.

    Is the company ownership of suppliers of critical ICT components verified?

    Yes. Zayo is a global corporation and rigorously assesses all Suppliers by strictly enforcing Inherent Risk Questionnaires (IRQs), Office of Foreign Assets Control (OFAC) and Committee on Foreign Investment in the United States (CFIUS) reviews, and Data Processing Agreements (DPAs). Agreements with Suppliers must include requirements to address the information security risks associated with information and communications technology services and the Organization’s product supply chain, which includes cloud computing services. It is the responsibility of Users to work with Suppliers to understand the information and communication technology supply chain so that the Organization knows the components that could have an important impact on the products and services being provided.  Supplier agreements state that Suppliers must adhere to the security requirements specified in the Supplier Relationships Policy they are required to sign, security requirements and practices specified are propagated throughout the supply chain, and relevant Organization teams associated with the Supplier and Supplier contract must ensure that monitoring is in place for validating that delivered information and communication technology products and services are adhering to the stated security requirements. Associated Organization teams must obtain assurance that the delivered information and communication technology products are functioning as expected without any unexpected or unwanted features. Information that Users share with a Supplier must only be shared based on a need-to-know and need-to-use basis throughout the supply chain, and this method of information sharing must be used by the Supplier in the case that the Supplier uses any other Suppliers for the services provided to the Organization.

    Are suppliers of critical ICT components under U.S. ownership?

    Not all. Zayo is a global corporation and rigorously assesses all Suppliers by strictly enforcing Inherent Risk Questionnaires (IRQs), Office of Foreign Assets Control (OFAC) and Committee on Foreign Investment in the United States (CFIUS) reviews, and Data Processing Agreements (DPAs). Agreements with Suppliers must include requirements to address the information security risks associated with information and communications technology services and the Organization’s product supply chain, which includes cloud computing services. It is the responsibility of Users to work with Suppliers to understand the information and communication technology supply chain so that the Organization knows the components that could have an important impact on the products and services being provided.  Supplier agreements state that Suppliers must adhere to the security requirements specified in the Supplier Relationships Policy they are required to sign, security requirements and practices specified are propagated throughout the supply chain, and relevant Organization teams associated with the Supplier and Supplier contract must ensure that monitoring is in place for validating that delivered information and communication technology products and services are adhering to the stated security requirements. Associated Organization teams must obtain assurance that the delivered information and communication technology products are functioning as expected without any unexpected or unwanted features. Information that Users share with a Supplier must only be shared based on a need-to-know and need-to-use basis throughout the supply chain, and this method of information sharing must be used by the Supplier in the case that the Supplier uses any other Suppliers for the services provided to the Organization.

    If distributors will be used to provide products/services to the Government, is a threat analysis performed for each distributor?

    Yes. Zayo’s Third Party Risk Management (TPRM) program identifies each of its suppliers, the products/services of which they supply, the risks and controls and assesses their strengths.

    Are Basic Security Requirements (not Derived Security Requirements) implemented for the fourteen families in Chapter Three of NIST SP 800-171 R3, Protecting Controlled Unclassified Information in Nonfederal Systems?

    Yes. Zayo’s security program is based upon the Unified Compliance Framework (UCF) and structured around a set of control objective categories addressing controls from a multitude of authoritative industry standards and requirements. The program’s policies and standards are managed and published internally. For more information about the UCF, refer to  https://www.unifiedcompliance.com/home.

    Do you perform due diligence on third parties to align with your own corporate policies and/or industry best practice?

    Every Supplier that has logical access, physical access, or access to the Organization’s data must complete the Organization’s security requirements assessment, which must reference the logical, physical, and data controls that must be followed. The Supplier must fill out the Security Requirements assessment upon receipt and indicate if an inability to follow any of the Security Requirements exists. 

    A review by the  Committee on Foreign Investment in the United States (CFIUS) is also required under the following circumstances, and may take up to 45 days:

    • Classify suppliers into risk categories (e.g., low, medium, high) based on business impact and criticality to operations.
    • Suppliers who have access to physical Corporate locations or sensitive personal data of US citizens and pose potential national security risks 
    • Suppliers perform transactions that may involve the transfer of critical technologies or sensitive information to foreign persons
    • Suppliers perform transactions in Corporate locations which are in close proximity to sensitive government facilities
    • Those whose transactions may have direct or indirect involvement by foreign governments
    • Conduct risk-based due diligence for all suppliers before engagement, considering factors such as data security, regulatory compliance, financial stability, and reputational risks.

    All third parties are assessed and re-assessed as service agreements change.

    Do you conduct business continuity and disaster recovery audits on your third-party providers?

    All third parties are included in business continuity and disaster recovery audits including exercises after organizational changes.

    Do you perform an evaluation on the commercial impact for cyber risks associated with third parties?

    Evaluations are performed through formal analysis utilizing modeling of potential financial impacts.

    Do you use defined threshold and escalation processes that help determine the application of appropriate cyber security strategies for identified third parties?

    A formal approach, using multiple metrics, consistent management strategies, and involving senior management helps determine appropriate cyber security strategies for third parties.

    Is a formal process documented for ensuring supply chain resilience as part of Zayo product offering Third Party Risk practices?

    Zayo’s TPRM program includes procedures for verification meeting contractual terms and conditions.

    Do you contractually require third parties to align with pre-defined services and Service Level Agreements (SLAs)?

    All third parties are contractually required to align with pre-defined services and SLAs which are updated as services change.

    Do you contractually require third parties to maintain insurance/other indemnification for any losses caused by the third party?

    All third parties are contractually obligated to maintain insurance/other indemnification for any losses, and terms are updated as services change.

    Are policies/processes in place to ensure timely notification of updated risk management information previously provided to the Contracting Officer and Contracting Officers?

    Yes.

    Do Supply Chain Risk Management (SCRM) requirements exist in contracts with critical ICT?

    Yes. Agreements with Suppliers must include, based on the need, the requirements to address the information security risks associated with information and communications technology services. Based on the security requirements agreed upon when signing the Supplier contract, the Organization reserves the right to conduct formal and regular reviews of the adherence to the specified requirements, which can include Supplier review and product validation. All third parties are assessed and re-assessed as service agreements change. If violations of contractual SCRM requirements or SCRM-related incidents occur, remediation activities are managed as issues as part of Zayo’s Risk and Issue Management program.

    Is there a process to verify that suppliers are meeting SCRM contractual terms and conditions, including, where applicable, requirements to be passed down to sub-suppliers?

    Yes. Zayo Group’s TPRM program includes procedures for verification meeting contractual terms and conditions.  

    What provisions for auditing are included within supplier contracts?

    The Organization reserves the right to audit Suppliers to validate compliance against MSAs and the Organization’s Corporate Supplier Requirements. The right to audit is a standard clause in all supplier contracts. Zayo reviews supplier contracts during onboarding and contract renewals, and security due diligence assessments are repeated annually.  

    Do you revise your written TPRM requirements regularly to include needed provisions?

    Yes.

    Do you have policies for your suppliers to notify you when there are changes to their subcontractors or their offerings (components, products, services, or support activities)?

    Yes. The responsibility for managing Supplier relationships must be assigned to a designated individual or management team responsible for the Supplier. In addition, the individual at the Organization that is designated to work with the Supplier must ensure that Suppliers assign responsibilities for reviewing compliance and enforcing the requirements of the agreements. Their Supplier resources must have sufficient technical skills and availability to monitor the requirements of the agreement, in particular the information security requirements. Appropriate action must be taken when deficiencies in the service delivery are observed.

    Are hardware/software products or services integrity and End of Life requirements passed down to second and third party suppliers?

    Yes, all suppliers must agree to and abide by Zayo policy and standards. 

    Are policies/processes in place to ensure timely notification of updated risk management information previously provided to the Contracting Officer and Contracting Officer’s Information Communications Technology (ICT) Supply Chain Management?

    Yes. The Zayo representative assigned to the customer organization is notified of any changes that occur and is responsible for communicating these changes with the customer/customer management. Customers are notified within 24-48 hours or any changes that may have occurred.

    Is there a documented Quality Management System (QMS) based on an industry standard or framework for the Organization’s Information and Communications Technology (ICT) supply chain operation? 

    Yes. Zayo’s Quality Management System (QMS) is defined as a set of policies, processes, and procedures required for planning and execution in the core business areas of the Organization.  In the EU, the QMS is based on the ISO9001:2015 Plan, Do, Check, Act Model. In the US, the QMS is based upon the Unified Compliance Framework (UCF) and structured around a set of control objective categories addressing controls from a multitude of authoritative industry standards and requirements. This framework and its supporting policies and standards are managed and published internally. For more information about the UCF, refer to  https://www.unifiedcompliance.com/home.

    Do you have an organization-wide strategy for managing end-to-end supply chain risks (from development, acquisition, life cycle support, and disposal of systems, system components, and to system services)?

    Yes. Our strategy is to Identify, Analyze, Evaluate, Treat, and Monitor. Actionable issues are created as necessary and assigned appropriately for risk throughout each stage of the lifecycle. Third-party intake, risk identification, measurement and assessment, mitigation, reporting and monitoring, compliance, and governance tasks also include periodic third-party risk audits and assessments.

    Is there a process to verify that suppliers are meeting TPRM contractual terms and conditions, including, where applicable, requirements to be passed down to sub-suppliers? 

    Yes. Zayo Group’s TPRM program includes procedures for verification meeting contractual terms and conditions.

    Are hardware/software products or services integrity and End of Life requirements passed down to second and third party suppliers?

    Yes, all suppliers must agree to and abide by Zayo policy and standards. 

    Are processes in place for addressing reuse and/or recycle of hardware products?

    Yes.

    Do you have a policy or process to ensure that none of your suppliers or third-party components are on any banned list?

    Yes.

    For hardware components included in the product offering, do you only buy from original equipment manufacturers or licensed resellers?

    Yes.

    Do you control the integrity of your hardware/software (HW/SW) development practices by using Secure Development Lifecycle practices?

    Yes.

    How do you manage the conformance of your third parties to your procedures?

    The responsibility for managing Supplier relationships must be assigned to a designated individual or management team responsible for the Supplier. In addition, the individual at the Organization that is designated to work with the Supplier must ensure that Suppliers assign responsibilities for reviewing compliance and enforcing the requirements of the agreements. Their Supplier resources must have sufficient technical skills and availability to monitor the requirements of the agreement, in particular the information security requirements. Appropriate action must be taken when deficiencies in the service delivery are observed. Open source code provided by a third party is scanned for integrity purposes prior to, during, and post deployment..

    Do you monitor third-party HW/SW products or services for defects?

    Yes.

    What are your processes for managing third-party products and component defects throughout their lifecycle?

    As part of Zayo’s Risk and Issue Management program, defects are logged as issues for remediation.

    What policies and procedures are in place to protect the integrity of the data provided through cloud services?

    To protect the integrity of data provided through cloud services, the Organization:

    • Uses secure communication channels (https/SSL/TLS) to encrypt data between the Organization and cloud service providers
    • Ensures that data stored in the cloud is encrypted to protect it from unauthorized access
    • Implements strong access controls using the principle of least privilege to only provide Users and systems with the minimum level of access required to perform their tasks.
    • Uses Multi-Factor Authentication as an extra layer of security
    • Utilizes network security best practices, such as firewalls, intrusion detection/prevention systems, and network segmentation, to safeguard the flow of data to and from the cloud
    • Sets up logging and monitoring to detect any unusual activities or potential security incidents, and regularly reviews logs and audit trails
    • Conducts periodic security assessments and audits to identify and address vulnerabilities
    • Understands and complies with relevant data protection laws and regulations
    • Ensures cloud service providers comply with the necessary certifications and standards.
    • Implements a robust data backup and recovery strategy to ensure that critical data can be restored in case of accidental deletion, data corruption, or other incident
    • Develops and regularly tests an incident response plan to ensure a swift and coordinated response to security incidents
    • Establishes communication channels and contacts with the Organization’s cloud service providers to report and address security incidents
    • Evaluates the security practices of the Organization’s cloud service providers and understand their security measures, certifications, and compliance with industry standards
    • Educates teams on security best practices regarding the use of cloud services and make them aware of potential risks and how to mitigate them
    • Keeps cloud infrastructure, operating systems, and applications up to date with the latest security patches to address known vulnerabilities

    How do you manage the shared responsibility for cloud service integrity requirements with your suppliers?

    The responsibility for managing Supplier relationships must be assigned to a designated individual or management team responsible for the Supplier. In addition, the individual at the Organization that is designated to work with the Supplier must ensure that Suppliers assign responsibilities for reviewing compliance and enforcing the requirements of the agreements. Their Supplier resources must have sufficient technical skills and availability to monitor the requirements of the agreement, in particular the information security requirements.

    What mechanisms are in place for direct employees and contracted workers to ensure applicable training has been completed?

    Security awareness training is administered, monitored, and reported upon hire and on an annual basis.

    Does Zayo have processes to evaluate prospective third-party suppliers’ product integrity during initial selection?

    Yes.

    What processes or procedures, if any, are in place to ensure that prospective suppliers have met Zayo’s product integrity requirements?

    Zayo’s TPRM program identifies each of its suppliers, the products/services of which they supply, risks and controls, and assessments. Per business practice, the TPRM program provides thoroughly vetted suppliers prior to onboarding.

    How do Zayo policies or procedures ensure appropriate management/leadership input on supplier selection decisions?

    Zayo’s TPRM program identifies each of its suppliers, the products/services of which they supply, risks and controls, and assessments. Per business practice, the TPRM program provides thoroughly vetted suppliers prior to onboarding.

    What provisions for auditing are included within supplier contracts?

    Agreements with Suppliers must include, based on the need, the requirements to address the information security risks associated with information and communications technology services as follows:

    • A description of the information to be provided or accessed and methods of providing or accessing the information
    • The classification of information according to the Organization’s classification scheme; if necessary, also mapping between the Organization’s own classification scheme and the classification scheme of the Supplier
    • Legal and regulatory requirements for the data being processed and the protection of the data as well as a description of how these requirements are met
    • A list of Supplier personnel authorized to access or receive the Organization’s information and a receipt of the information given to the Supplier personnel
    • Security policies relevant to the specific contract
    • Incident management requirements and procedures, including the training and awareness requirements associated
    • Relevant regulations for sub-contracting
    • Screening requirements, if any, for the Supplier’s personnel to ensure that its staff has reasonable and necessary experience to perform the work. Background verification checks on all Supplier’s personnel must be carried out in accordance with relevant laws, regulations and ethics and must be proportional to the business
    • Right to audit the Supplier processes and controls related to the agreement: The Organization reserves the right to audit
    • Suppliers to validate compliance against MSA and the Organization’s Corporate Supplier Requirements
    • Supplier’s obligation to periodically deliver an independent report on the effectiveness of controls and agreement on timely correction of relevant issues raised in the report
    • Supplier’s obligations to comply with the Organization’s security requirements

    How do you pass down HW/SW products or services integrity requirements to third party suppliers?

    Requirements are outlined in contractual language and Data Processing Addendums.