Browse all OIT tools and services or search for a specific tool or service using the search box or filters.
These tools, software, and programs have all been vetted by our security and compliance team and are supported by our service desk.
Third party vendor applications and cloud services can present significant risk to the university. To mitigate the risk, the Risk and Compliance (RAC) team reviews the security of vendor organizations for server applications facing the internet, or services provided by a vendor that will have access to university confidential, or highly confidential data (including HIPAA, FERPA, and PCI data). This process is essential in minimizing legal issues during the negotiation of the IT Security language during the contract process.
Third party vendors are now subject to the same Security Rule requirements as Covered Entities, and are also subject to relevant sections of the Privacy Rule and the HITECH Breach Notification Rule. In order to protect university confidential and highly confidential data, including PHI, the risk and compliance team assesses the security and practices of all third party vendor server applications and cloud services. Third party vendor applications include those that process, transmit or store PCI (Payment Card Industry) data.
Third party vendors must:
Timeline: Please note, we complete requests in the order we receive them and timelines are dependent on the responsiveness of the requestor, vendor, and the complexity of the agreement. More information is available on the Technology Risk Assessment Process webpage. You will need to be on campus or signed into VPN to access the resources on this webpage.
In addition, the process also includes working with our vendor to ensure that technology procured by the university are inclusive and accessible. The RAC process will now collect a Voluntary Product Accessibility Template (VPAT) and accessibility questionnaire from the vendor to produce a digital accessibility risk assessment. This digital accessibility risk assessment will provide insight on the technology's digital accessibility level of compliance and will be sent back to the original requestor. For recommended steps following the risk assessment, please reference steps 2 and 3 in our CU Anschutz Procuring Accessible IT guide.
303-724-4357 (4-HELP)
7:30 a.m. - 6 p.m., M - Th
7:30 a.m. - 5 p.m., Fri
Submit a ticket
Email the Service Desk
24/7 access to the Service Center