Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Why is SUNY Fredonia requiring this TRP?

...

Step 2: Submit a Technology Request and FREDMart Requisition - Customer completes the Technology Request Form and FREDMart Requisition. Upon submitting the TRP form, a Tracker ticket is created to initiate the review of the request. All other non-technology contracts and licenses should be sent directly to Contract Review

Please review Tying FREDmart and Tracker Together

...

Step 1. To complete the required Data Security Risk Assessment, please confirm the University data types that you are requesting to be used with this solution by completing a Data Security Risk Assessment Form.

Step 2. The CISO or designee will review and then reach out to you or the vendor (if needed) to obtain further information. The CISO may need to contact the vendor to obtain a Higher Education Community Vendor Assessment Tool (HECVAT) and/or SOC 2 Type 2 report if University Category 2 and 3 data is requested to be used.

...