Vendor Security Review
Assess technology solutions which will access, process, or store university data. Solutions include professional services, infrastructure, storage, application environments, or other cloud-based services or subscriptions. Reviews are approved only for a specific use case and will be re-evaluated periodically. To provide the information necessary to perform a security review, vendors must complete the Vendor Technology Workbook.
- Identify risks associated with a technology solution as part of procurement process.
- Consultation on securing university data as regulated by Federal, State, local laws and regulations, university policies, procedures, and standards.
- For more information on what types of vendors require a security review, see Outsourcing Technology at Ohio University (PDF).
Faculty and Staff
How to Request
Contact the Information Security Office at firstname.lastname@example.org. Provide a specific use case, audience, and sensitivity of data that will be used by this technology solution.