First-party technology refers to tools or systems that collect and manage data directly from a company's own customers through its owned platforms, such as websites, mobile apps, and CRM systems. This can includes:
- Security Control(s) Validation
- IAM Onboarding (initial SSO or MFA setup requests)
- Service Account or Shared Mailbox creation
- Requests for access to departed employee/student workstations/OneDrive/Inbox
- Application Security Risk Assessments (ASRAs)
- Environmental Security Risk Assessment (ESRAs)
- Material Transfer and Confidential Disclosure
- Data Use Agreements (DUAs)
- Data Sharing Agreements (DSAs)
- Security Control Exception Requests
- Remote Work and/or Travel Requests
Third-party technology refers to any software, hardware, or service created by a company or individual not directly affiliated with the primary organization that provides the main platform or system. Third-party risk assessment needs would be related to the IT Purchasing Process, including:
- IT Readiness Forms and Submissions
- Service Provider Security Assessments (SPSAs)
- Contract Review
- PCI Attestation of Compliance (AOC) Review
- Higher Education Community Vendor Assessment Toolkit (HECVAT) Review
Information Technology (IT) refers to any equipment or interconnected system or subsystem of equipment that is used in the creation, conversion, or duplication of data or information. This includes, but is not limited to:
- telecommunications products
- information kiosks and transaction machines
- Internet and Intranet websites
- web-delivered content
- software
- electronic books and electronic book reading systems
- search engines and databases
- multimedia
- classroom technology
- office equipment
- computers, laptops, and tablets