To minimize the risk to university data, the university needs to take a methodical approach when engaging third party service providers and cloud-based services for data storage, processing or outsourcing of university data. The Vendor Risk Management program (abbreviated VRM) is UCF Infosec’s answer to this need.
The VRM process applies to any university department or university business unit considering contracting with a third party service provider for the purposes of storing, transmitting, processing, or collecting university data on our behalf.
In this process, the service-seeking unit submits information about the proposed vendor, solution, and data involved. The Information Security Office (ISO) reviews this package and follows up with the service-seeking unit and/or vendor regarding any questions or concerns. The Information Security Office review results in a formal VRM Assessment report which summarizes what was reviewed, any findings/concerns, and recommendations. The report is reviewed and signed by the appropriate UCF business and data owners, and a signed copy with their signatures must be returned to the Information Security Office.
QUICK links
Does the VRM Process Apply to You?
Before working with a third-party vendor, check if a Vendor Risk Management (VRM) review is necessary. Answering “YES” to any of the questions below indicates a VRM review is required. If you have questions about the VRM process, please contact the Information Security Office.
- Are you transferring UCF data to a non-UCF system?
- Are you hiring a provider to build a site or system for UCF to handle UCF data?
- Are you hiring a provider to collect data for later use by UCF?
- Are you hiring a provider to handle credit card payments for UCF?
UCF PROCESS DOCUMENTS
LINK | DESCRIPTION |
---|---|
VRM Standards |
Review 120 VRM Standard for specific guidance on Unrestricted, Restricted, or Highly Restricted VRMs and the process for each. |
Vendor inventory list |
This is a list of all vendors that have been approved by ISO to meet 120 VRM Standards. To avoid duplication of vendors for similar use cases, UCF units should consult the Vendor Inventory list to ensure there isn't an existing solution for their use case that meets these standards and is already in use at UCF. |
UCF PROCESS DOCUMENTS
Review 120 VRM Standard for specific guidance on Unrestricted, Restricted, or Highly Restricted VRMs and the process for each.
Vendor inventory listThis is a list of all vendors that have been approved by ISO to meet 120 VRM Standards. To avoid duplication of vendors for similar use cases, UCF units should consult the Vendor Inventory list to ensure there isn't an existing solution for their use case that meets these standards and is already in use at UCF.
VENDOR DOCUMENTS
LINK | DESCRIPTION |
---|---|
"Secure Handling of UCF Data” Questionnaire | Vendor reviews and accepts these terms and integrates them into the contract, agreement, or SLA associated with the engagement. This ensures that UCF’s security and compliance requirements are outlined in legal terms. |
HECVAT |
Vendor evaluates this questionnaire. The “Higher Education Cloud Vendor Assessment Tool” is an industry-standard questionnaire that assists in understanding a Vendor's security posture. |
PCI ADDENDUM |
For vendors that may store, process, transmit or can impact the security of cardholder data, this addendeum clarifies the PCI responsibilities between the vendor and UCF. |
VENDOR DOCUMENTS
Vendor reviews and accepts these terms and integrates them into the contract, agreement, or SLA associated with the engagement. This ensures that UCF’s security and compliance requirements are outlined in legal terms.
HECVATVendor evaluates this questionnaire. The “Higher Education Cloud Vendor Assessment Tool” is an industry-standard questionnaire that assists in understanding a Vendor's security posture.
PCI ADDENDUMFor vendors that may store, process, transmit or can impact the security of cardholder data, this addendeum clarifies the PCI responsibilities between the vendor and UCF.
Frequently asked questions
- Will the third party/vendor proposing this click-through agreement have access to, store, transmit, process, or collect any UCF data on our behalf?
- If yes, please go to Question 2.
- If no UCF data is involved at all, please proceed with the click through.
- Please refer to UCF Policy 4-008 and classify the data involved as Unrestricted, Restricted, or Highly Restricted Data.
- If the data involved is either Restricted or Highly Restricted, go to Number 3.
- if the data is Unrestricted, please go to Number 4.
- If Restricted data or Highly Restricted data is involved, do the following:
- A click through agreement alone is not acceptable. Engage the vendor to create a formal, mutually executed (signed by both parties) agreement that contains the Secure Handling of UCF Data Questionnaire.
- Submit a Vendor Risk Management request to the Information Security Office for review via the ServiceNow link above.
- If Unrestricted data is involved…
- Review the agreement and verify that it has basic security language. Consult the FAQ item “What should be included in the final contract or agreement?” below for guidance on what should be present for Unrestricted Data.
- Proceed with the click through.
- The Secure Handling of UCF Data Questionnaire must be signed by the vendor and included in the final set of agreements.
- Any comments, edits or redlines to the Secure Handling of UCF Data Questionnaire, or any data or security-related edits to the contract in general, must be jointly reviewed by UCF Infosec and the UCF General Counsel’s Office prior to acceptance and execution.
- NO contract shall be executed until an acceptable agreement has been negotiated between UCF and the other party/vendor, reviewed, and approved by the UCF General Counsel’s Office, and a VRM assessment report is provided to the UCF unit and signed by UCF unit leadership in the case of highly restricted data.
- In cases where there is no formal agreement (such as only having a PO), the Secure Handling of UCF Questionnaire must be executed and attached.
The length of the VRM process depends on a number of factors, including what data is involved, the vendor’s responses and follow-up, and contractual language needed. Typically, when highly restricted or restricted data is involved in the proposed engagement, a period of several weeks is needed but can be longer.
Note that a key part of the VRM process is ensuring that contracts and agreements contain agreeable language from a data security and compliance point of view. If the vendor disagrees with terms of the Secure Handling of UCF Data Questionnaire, the interactions with a vendor’s legal team and the general process of modifying contracts and agreements in tandem with UCF General Counsel may add significant time to the process before a VRM Assessment Report can be provided.
ISO needs to perform our due care and diligence to minimize the risk to UCF data shared with vendors. Please submit a VRM request as early as possible in the procurement process to ensure ISO has enough time to review the vendor.
If the data involved in your work on the software or hardware is not being stored, transmitted, processed, or accessed by the vendor you are purchasing from, it does not need to be submitted for VRM review.
However, if the piece of technology works in such a way that the vendor would store or process UCF data, it should be submitted for VRM review.
Regardless, ensure you are still following purchasing and procurement procedures for your unit and the university (such as Intent To Negotiate/ITN, Information Resource Request/IRR etc) where applicable.
Examples of items that do not require VRM review:
- Local software that is installed on a desktop machine where the data is stored on a UCF-owned workstation or server
- Software or platforms that will be installed in UCF-owned Infrastructure environments (e.g. Datasite orlando, Azure) and that will not transmit the data to any third parties
- computer hardware (servers, switches, monitors, desktops, laptops, etc) as long as they will be UCF owned and deployed within a UCF-owned envioronment (Datasite orlando, Azure)
Examples of items that do require VRM review:
Data Type | Required Documents for ISO Review | May be needed upon ISO request: |
---|---|---|
Highly Restricted |
|
|
– including PCI |
|
|
Restricted |
|
|
Unrestricted |
|
The data involved determines what should be included in the final contract or agreement:
Data Involved | Include with contract: |
---|---|
Highly Restricted Data | Secure Handling of UCF Data Questionnaire |
|
|
|
|
Restricted Data | Secure Handling of UCF Data Questionnaire |
Unrestricted | Should contain sections relating to:
|
It is important to re-review a vendor whenever key parts of the engagement have changed. This can include:
- Any time the contract or agreement is changed or is up for renewal
- Any time the data that will be shared with the vendor changes (especially if the newly proposed data is classified at a higher level of restriction)
- See UCF Policy 4-008 at http://policies.ucf.edu/ for information on the classification of UCF Data
- Any time the means of data transfer changes, such as adding a connection to an on-premise UCF system
- Any time the vendor experiences a data- or security-related breach
ISO requires the VRM assessment report to be signed and returned by the UCF service-seeking unit. The signatures represent an acknowledgement of the findings and recommendations. The signatures do not have to wait on the actual completion of any recommendations. Additionally, there may be up to two signature fields – the UCF Business Unit and the UCF Data Owner.
UCF Business Unit – The service-seeking unit engaging directly with the vendor. This signature is always required.
UCF Data Owner – This is the person primarily responsible for the accuracy, privacy, and integrity of the data that is proposed to be shared with the vendor under review. When the owner of the data differs from the service-seeking unit, ISO may require their signature acknowledging the potential risks and recommendations.
For example, if FERPA-protected data is involved, UCF’s Registrar’s Office may need to sign as data owner.
In both cases, the signees should be at a leadership/VP level empowered to accept risk on behalf of the unit.