Information Security Assessment

Get Started

The IT Products and Assessment Form is designed to ask you the most relevant questions about the software or service in question. Depending on the specific service being requested and the context of the request, it may require a full evaluation to further determine its risk profile. Often, the university offers equivalent services at low or no cost to end users. 

Managing a Request

New updates to the assessment form now include the additional information needed for the Digital Accessibility Coordinator. This will help to simplify and coordinate efforts to review software requests. Once a request is submitted via the IT Products and Services Form a ticket will be created with IT Business Operations (ITBS). Once a ticket is created, ITBS will provide next steps.

Law and Policy

Texas State University follows TAC 202, and implements university policies to properly secure the transmission and storage of information. Please refer to our data classification and policies page to understand the Texas State University standards for properly classifying and securing university data.

Existing Services

Please refer to the Division of IT Service Catalog to ensure you are not duplicating a service. Depending on the specific service being requested and the context of the request there might already be information on file which can help us assess the product more quickly. 

Cloud-hosted services

Unauthorized third-party cloud hosted services are not permitted on the Texas State network, read more to find out whyIf requesting a cloud-hosted service, please request that the service vendor complete the HECVAT - Higher Education Community Vendor Assessment ToolkitYou may complete the Service Evaluation Request form prior to receiving a completed HECVAT. However, fulfillment of the service evaluation process may be contingent upon your vendor completing the HECVAT. In most circumstances, requesting a copy of the "Full" HECVAT is appropriate.

Denied Requests

Not all software or service requests will be approved. If your software or service is not authorized, the ISO will endeavor to direct you to equivalent authorized services.

Submit a Security Assessment Request

Completion and submission of the IT Products and Services Request Form will create a support ticket with IT Business Services and start the process for security assessments and any IT related procurement. Once the form is submitted, IT Business Services will work with you and your department to determine next steps.