Data & Technology Risk Review Guide

Summary

This article explains how to request a Data and Technology Risk Review to ensure compliance with cybersecurity, technical, and legal standards before completing technology purchases, renewals, or contract updates.

Body

Topics Answered in this Article

Overview

This article explains how to request a Data and Technology Risk Review to ensure compliance with cybersecurity, technical, and legal standards before completing technology purchases, renewals, or contract updates.

How to Request a Risk Review

  1. Complete the IT Security Review: Submit Data and Technology Risk Review request.
  2. Await IT Security Approval: The IT security team will review your submission and may request additional details. Once approved, you will receive an email confirmation.
  3. Upload Approval with Contract: Attach the IT security approval email to your contract in Agiloft.

Additional Details

The Data and Technology Risk Review service request is used by the Cybersecurity Governance, Risk, and Compliance team to evaluate technology purchases, changes, renewals, contract terms, data integrations, and other requests. The goal is to ensure compliance with technical, cybersecurity, and legal standards. This process helps identify whether the request involves sensitive or critical business data/services and ensures that appropriate controls are in place to reduce risk to the University. A key stakeholder from the business unit responsible for the technology or service should complete this intake form.

Details

Details

Article ID: 159630
Created
Fri 12/12/25 2:52 PM
Modified
Fri 12/12/25 2:54 PM
Environment
Security