Table of Contents
Computing Support can help you evaluate hardware and get quotes
Does the software you are planning to use meet University Accessibility Standards. All software, web pages, posted videos for a large group of students or the general public will need to be checked for accessibility. Or you can contact email@example.com
Software and hardware that will be storing any grant or PII data, should be verified that it meets the University security guidelines. All data that contains PII data should be secured and protected.
Please contact Computing Support if you will be purchasing or contracting for either of the above.
Will the software be used by people outside your unit?
If you are purchasing the software/service for those in your immediate unit (i.e., they are members of your research team, or work in your department) you are more likely to know about any existing accessibility needs for your users. If, on the other hand, you’re purchasing this software for folks outside of your unit/your sphere of knowledge, we can help evaluate the risk involved in purchasing for this group.
Is this software used to collect, store, or transmit Restricted Data or process payments of any kind?
Restricted Datarefers to any confidential or personal information that is protected by law or policy. Examples include, but are not limited to: Personal Identity Information (social security numbers, etc.), electronic protected health information, credit card data, etc. Please refer to the security website for further definitions
Is this software used to collect, store, or transmit data governed by a federal research contract or grant?
Some federal research contracts or grants have specific data security requirements. The security team can help you review and meet these requirements
To Complete an Accessibility Review:
Forward a copy of this questionnaire and your contact information to the Accessibility team (firstname.lastname@example.org) as soon as possible to initiate the process. Please remember the review needs to be completed prior to proceeding with your purchase.
To Complete a Security Review:
Forward a copy of this questionnaire and your contact information to the IT Security Team (email@example.com) as soon as possible to initiate the process. Please remember the review needs to be completed prior to proceeding with your purchase.