Browse commonly used Information Security and IT Compliance (ISIC) tools and services below. The ISIC team provides several services to keep your information and the university's data safe. Services provided include monitoring, protecting and securing our information technology infrastructure, data and operations to safeguard the privacy of the university community while maintaining compliance with applicable policies, laws and regulations.
For information technology services, visit our Information Strategy and Services partner at the Office of Information Technology (OIT) website or contact the Service Desk for additional questions.
The Risk and Compliance process consists of the following steps:
To protect university confidential and highly confidential data, including PHI, the RAC team assesses the security and practices of all third-party vendor server applications and cloud services.
Third party vendors must:
Requests are processed in order received. Timelines depend on responsiveness and complexity, typically taking 10–15 business days. More details are on the Technology Risk Assessment webpage (SSO required).
To get started, Complete the Technology Risk Assessment form.