About This Service
Prior to finalizing or purchasing software, IT requires a security review to analyze the risks to our systems and data
Security reviews include evaluating
- the inherit security of the system or cloud vendor system
- if integrations are required, the nature and security of the integrations
- how the software or service will be using our data
- who owns the data in the system
and much more.
Additional Information
- If you've been asked to share a HECVAT for a vendor, please use this form.