First-party would include things such as: Security Control(s) Validation; IAM Onboarding (initial SSO or MFA setup requests); Service Account or Shared Mailbox creation; Requests for access to departed employee/student workstations/OneDrive/Inbox; Application Security Risk Assessments (ASRAs), Environmental Security Risk Assessment (ESRAs), Material Transfer and Confidential Disclosure or Data Use Agreements (DUAs) or Data Sharing Agreements (DSAs), Security Control Exception Requests; Remote Work and/or Travel requests.
Third-party would be related to the IT Purchasing Process which includes IT Readiness questionnaires, Service Provider Security Assessments (SPSAs), contract review, PCI Attestation Of Compliance (AOC) review; HECVAT review.
Information Technology (IT) refers to any equipment or interconnected system or subsystem of equipment that is used in the creation, conversion, or duplication of data or information.
IT includes, but is not limited to:
- telecommunications products
- information kiosks and transaction machines
- Internet and Intranet websites
- web-delivered content
- software
- electronic books and electronic book reading systems
- search engines and databases
- multimedia
- classroom technology
- office equipment
- computers, laptops, and tablets