To minimize the risk to university data, the university needs to take a methodical approach when engaging third party service providers and cloud-based services for data storage, processing or outsourcing of university data. The Vendor Risk Management program (abbreviated VRM) is UCF Infosec’s answer to this need.
The VRM process applies to any university department or university business unit considering contracting with a third party service provider for the purposes of storing, transmitting, processing, or collecting university data on our behalf.
In this process, the service-seeking unit submits information about the proposed vendor, solution, and data involved. The Information Security Office (ISO) reviews this package and follows up with the service-seeking unit and/or vendor regarding any questions or concerns. The Information Security Office review results in a formal VRM Assessment report which summarizes what was reviewed, any findings/concerns, and recommendations. The report is reviewed and signed by the appropriate UCF business and data owners, and a signed copy with their signatures must be returned to the Information Security Office.
Submit a vendor for review using the Vendor Risk Management request in ServiceNow:
UCF Service-Now Portal
(Request a Service ➔ Access and Security)
|Document Title||Description||Download Link|
|Minimum Security Requirements||Vendor initials each item and signs document to ensure UCF’s minimum security requirements are met. Vendor must explain any items they are not able to initial for.||PDF (version 2017-11)|
|Third Party Data Security Assurance Questionnaire (SAQ)
||Vendor completes questionnaire and signs. This questionnaire provides an in-depth look at the vendor’s information security posture.||XSLX Spreadsheet (version 2018-01)|
|“Secure Handling of UCF Data” Security Rider
||Vendor reviews and accepts these terms and integrates them into the contract, agreement, or SLA associated with the engagement. This ensures that UCF’s security and compliance requirements are outlined in legal terms.||PDF (version 2017-08)|
Q: Does the VRM program apply to my proposed vendor, program, or project?
A: If you answer YES to any of the following questions, your project needs a VRM review.
Are you transferring data currently residing on a computer system owned by University of Central Florida to a computer system not owned by University of Central Florida?
Are you contracting with a service provider who will create a web site, or implement a system on behalf of the University Central Florida to collect, process, or store university data?
Are you contracting with a service provider to collect data that will later be transmitted for use by University Central Florida?
Are you contracting with a service provider that will accept credit card payments on behalf of the University Central Florida?
If you have any questions about the applicability of the Vendor Risk Management process, please do not hesitate to contact the Information Security Office.
Q: What documentation do I need to include with my submission?
A: Consult the “Vendor Risk Management” request in ServiceNow, which outlines which documents need to be included depending on the data involved in the engagement. Additional documentation may be requested by ISO over the course of the review.
Q: Where does the Vendor Risk Management process fit in relation to General Counsel’s legal review of contracts or agreements?
A: Ensure the Vendor Risk Management process is completed before submitting contracts/agreements to General Counsel’s Cobblestone system. The VRM assessment report that is provided to you by the Information Security Office should be attached to your contract/agreement submission.UCF General Counsel uses the assessment report and ISO’s feedback on the security language of any legal documents as part of their review.