Skip to content
English
  • There are no suggestions because the search field is empty.

Tailor Your Inventory With Custom Fields and Guide Vendor Scout’s Research

Custom fields allow you to capture the vendor information that matters most to your organization. They also guide Vendor Scout, MineOS’s AI agent, to research vendors, populate relevant answers, and help complete your data mapping automatically.

For example, many organizations add custom fields to track things like:

  • Security certifications

  • AI usage

  • Data transfer mechanisms

  • Business ownership

  • Vendor alternatives

This article explains how to:

  • Add custom fields to data sources

  • Write descriptions that help Vendor Scout understand the context

  • Design fields that support TPRM, AI governance, compliance, and RoPA documentation

How to Add a Custom Field

  1. Navigate to Settings → Data Mapping → Customization

  2. Click New field in the bottom section under custom fields

  3. In the Used in dropdown choose: Data sources
  4. Fill in the following details:

    • Name – the field label that will appear in the data source page

    • Description – explains how the field should be used and helps Vendor Scout generate better suggestions

    • Type

      • Text

      • List of options

  5. Click Create

Once created, the field will appear on Data Source profiles under General.

Writing Descriptions That Help Vendor Scout

When creating custom fields, the description helps Vendor Scout understand what information it should look for when researching vendors.

Clear descriptions improve the likelihood that Vendor Scout can suggest or populate values automatically.

Field name: Sub-processors
Description: Third-party service providers used by the vendor to process or store customer data.

Why this works well

Vendor Scout may find this information from:

  • vendor sub-processor lists

  • privacy policies

  • trust centers

Below is a table of recommended data fields you could add and allow vendor scout to populate for you:

Name Description Type Example Values (if type is list)
Entity Type Identifies whether the data source is an external vendor, internal system, or affiliate entity. List External Vendor, Internal System, Affiliate / Subsidiary, Partner
Headquarters Location Country where the vendor’s primary headquarters is located. Text  
Privacy Policy URL Link to the vendor’s public privacy policy describing how personal data is processed. Text  
Alternatives Alternative vendors or solutions that could replace this system if needed. Text  
Security Certifications Security certifications or attestations held by the vendor. List SOC 2, ISO 27001, ISO 27701, PCI DSS, HIPAA, CSA STAR, FedRAMP, Other
Data Protection Officer Contact Contact information for the vendor’s DPO or privacy contact. Text  
Incident Notification Timeline Vendor’s stated timeframe for notifying customers of security incidents or breaches. List 24 hours, 48 hours, 72 hours, Within contractual SLA, Not specified
Data Subjects Types of individuals whose personal data may be processed by the vendor. List Employees, Customers, Prospects, Contractors, Partners
Sensitive Data Processing Indicates whether special category or highly sensitive data is processed. List Yes, No, Unknown
Data Retention Policy How long the vendor retains personal data or customer information. Text  
Server Locations Countries or regions where data is stored or processed. Text  
Data Transfer Mechanism Legal mechanism used for cross-border data transfers. List Standard Contractual Clauses (SCCs), EU-US Data Privacy Framework (DPF), Binding Corporate Rules (BCR), Local Processing Only
Data Residency Options Regions where the vendor allows customer data to be hosted. List US, EU, UK, Canada, APAC, Multi-region
Authentication Methods Authentication options supported by the vendor. List SSO, SAML, OAuth, MFA, Username & Password
Uses Artificial Intelligence Indicates whether the vendor uses AI or machine learning as part of its service. List Yes, No, Unknown
AI Training Data Usage Whether customer or employee data may be used to train vendor AI models. List Yes, No, Unknown
Automated Decision Making Indicates whether the system performs automated decisions affecting individuals. List Yes, No
AI Risk Classification Internal classification of the vendor’s AI risk level. List Low Risk, Medium Risk, High Risk, Prohibited

Last Risk Review Date

Date when the vendor was last assessed as part of your risk or compliance review. Text  
Cross-Border Transfer Mechanism The legal mechanism the vendor relies on for transferring personal data across borders. List SCCs; BCRs; Adequacy decision; Other/unspecified; Unknown
AI Model / Vendor Disclosed The AI model, model family, or AI provider publicly disclosed by the vendor. Text  
AI Feature Type (Generative, Predictive, etc.) The type of AI capability the vendor offers. List Generative AI; Predictive analytics; Recommendation; Classification; Clustering; Chatbot; Vision; Speech recognition; Fraud detection; Forecasting
AI description (website) A short description of how the vendor uses AI and what feature or workflow it supports. Text  
Retention / Retention Period The vendor’s stated retention period for customer or personal data. Text  
Deletion SLA After Termination How long the vendor says it takes to delete data after the contract or service ends. Text  
Backup Retention Window How long backup copies of data may be retained by the vendor. Text  
Certifications / Frameworks The certifications, audits, or compliance frameworks the vendor publicly references. List SOC 1; SOC 2; SOC 3; ISO 27001; ISO 27701; ISO 27017; ISO 27018; PCI DSS; HIPAA; FedRAMP; GDPR; CCPA; COPPA; DPF; CSA STAR; Cyber Essentials; TISAX; NIST CSF; ISO 9001; HDS; other
Subprocessors The third-party service providers the vendor uses to support delivery of its service. Text  
Data Sharing / Selling Public Claim The vendor’s public statement about whether it shares or sells data. List No selling; Shares with subprocessors only; Shares for marketing/ads; Sells data; Unclear
Privacy Policy Link A link to the vendor’s privacy policy. Text  
Trust Center / Security Passport Link A link to the vendor’s trust center, security page, or equivalent security documentation hub. Text  
Anti-Bribery / Code of Conduct Link A link to the vendor’s code of conduct, ethics policy, or anti-bribery statement. Text  
DPO / Privacy Officer Contact The contact details for the vendor’s data protection officer or privacy contact. Text  
DSR / Data Subject Rights Coverage The data subject rights the vendor says it supports or honors. List Access; Erasure; Rectification; Portability; Objection; Restrict processing; Automated decision-making; Do not sell / Share; Transparency; Withdraw consent; Appeal; Non-discrimination; Sensitive data rights
Cookies / Tracking Technologies The types of cookies or tracking technologies the vendor says it uses. List Essential; Functional; Analytics; Advertising; Performance; Social media; Tracking pixels; Necessary; Marketing; Share or sale; Unknown
CMP Vendor (Consent Management) The consent management platform the vendor appears to use for cookies or consent collection. List OneTrust; Didomi; Cookiebot; UserCentrics; TrustArc; Custom; Unknown; other
Children’s Data Policy The vendor’s public position on whether children’s data is allowed or restricted. List Under 13 prohibited; Under 16 prohibited; Under 18 prohibited; Allowed with consent; Unknown
Responsible AI / Bias-Fairness Public Commitment Whether the vendor publicly states a commitment to responsible AI, fairness, or bias mitigation. List Yes (evidence link); No; Unknown
Explainability / AI Risk Disclosure The types of AI governance, explainability, or risk transparency commitments the vendor publicly provides. List Human oversight; Bias testing; Fairness evaluation; Explainability methods; Transparency report; Model cards; Responsible AI principles; Ethics statement; Risk mitigation procedures; Absent
Human-in-the-Loop / Oversight Claim Whether the vendor publicly states that humans review, supervise, or can override AI-driven outcomes. List Yes; No; Unknown
HQ / Primary Legal Entity Country The country where the vendor’s headquarters or main legal entity is located. List Country name selected by the customer
Hosting Provider The main cloud or infrastructure provider the vendor appears to rely on. List AWS; GCP; Azure; Own DC; Oracle Cloud; Other
Security Controls (TOMs) The technical and organizational measures the vendor publicly describes for protecting data. List Encryption at rest; Encryption in transit; MFA; multi-factor authentication; SSO; RBAC; role based access; Audit logging; DLP; Vulnerability management; Pen-testing; penetration testing; Incident response; Disaster recovery; Business continuity; Backups; Data minimization; Access reviews; Segregation of duties; Security awareness training; Monitoring / SIEM; Endpoint protection; Key management; Secure SDLC; Patch management