We Help You Choose Compliant, Compatible Technology
ITCS evaluates new and existing software for verification of compliance regarding
PCI and other sensitive data types.
When is a Technology Security Assessment Necessary?
- Department purchases a new technology
- Requisition - Materials Management submits the assessment request.
- ProCard - The department submits the assessment request.
- Department already owns a technology, and...
- ...the technology has never been assessed. The department submits the assessment request.
- ...the technology's use case has altered, and a re-assessment is necessary. Cloud-based solutions utilizing sensitive data are reviewed ANNUALLY or during renewal cycle. The department submits the assessment request.
- Additional guidance for ONLINE INSTRUCTIONAL TOOLS is found: www.ecu.edu/onlinetools/
- Department is contemplating a software purchase (department submits the assessment request)