Compliance - Technology Acquisition Reviews

Technology Acquisition Reviews (TAR) are required to ensure compliance with CSU policy and SF State practice directives for data and system protection, and to reduce the risk of data breaches resulting in: harm to CSU, individuals or intellectual property rights, and any associated legal/reputational penalties.

All technology must be deployed in a manner that meets the following requirements. IT Provider, Security, and Accessibility reviews identify additional requirements as applicable.

  1. Networked devices must meet CSU Common Network Infrastructure (CNI) standards.
  2. Use in-transit and at-rest encryption for all sensitive data.
  3. Authorization and access control must be managed for all sensitive data and in accordance with existing centralized identity and access management methods where possible (configured to use SF State’s Single Sign-On).
  4. The business reason for storing any confidential data must be documented, and a data retention schedule must be established and followed (e.g., how long the data will be kept, how it will be destroyed, etc.).
  5. Maintain university ownership by using SF State credentials to register and manage Cloud/Internet service accounts.
  6. Install security updates and patches provided by the manufacturer as soon as reasonable, based on severity (and after adequate testing).
  7. Meet requirements of Accessible Technology Initiative.
  8. Do not store or transmit protected University data using services hosted by third parties which do not have a contract in place with the campus or its Auxiliaries, such as personal cloud accounts.
  9. Do not sign up for or accept terms of service/use for a cloud service without first obtaining prior approval from Procurement, even if the service is no cost.

In limited cases when information security compliance cannot be met during an acquisition or implementation, the Information Security Office will work with the requestor to put in place a risk acceptance form. The form lists any mitigating controls that are used to reduce the risk, and indicates when the risk will be remediated or next reviewed. An administrator capable of assuming the risk (an AVP level or above depending upon the issue) and the Information Security Officer must approve the risk acceptance. The Information Security team can assist with preparing the form.

  • Section 8000 - Information Security

    • 8040 Managing Third Parties
    • 8055 Change Control
    • 8060 Access Control
    • 8065 Asset Management
    • 8075 Information Security Incident Management
    • 8085 Business Continuity and Disaster Recovery
  • Section 5000 - Contracts and Procurement
  • Information Technology

    • Confidential Data
    • Cloud Computing
    • Credit Card Payment Processing and PCI Security
    • Logging and Threat Management
    • Password
  • Fiscal Affairs
    • Procurement Card & University Liability Cards