Ohio University

Vendor Security Review

Assess technology solutions which will access, process, or store university data. Solutions include professional services, infrastructure, storage, application environments, or other cloud-based services or subscriptions. Reviews are approved only for a specific use case and will be re-evaluated periodically. To provide the information necessary to perform a security review, vendors must complete the Vendor Technology Workbook.


  • Identify risks associated with a technology solution as part of procurement process.
  • Consultation on securing university data as regulated by Federal, State, local laws and regulations, university policies, procedures, and standards.
  • For more information on what types of vendors require a security review, see Outsourcing Technology at Ohio University (PDF).


Faculty and Staff 

How to Request

Contact the Information Security Office at security@ohio.edu. Provide a specific use case, audience, and sensitivity of data that will be used by this technology solution.