Topics Map > Business Office

App/Software, Cloud/Web Service Purchasing Guidelines

Guidelines for purchasing Applications or Software, as well as Cloud or Web Services for Use on University-Owned Devices

Any application or service with the intent of storing or using UW data must be reviewed and vetted by different University offices before receiving approval to purchase. This ensures that the software is safe to load on to University-owned devices; that it is secure enough to protect University-owned data; and that the terms and conditions agreed to by appropriate University staff are in compliance with University policies and State Statutes. L&S Business Office staff can help the department to follow up with the appropriate Campus offices.

These approvals are needed prior to using University funds to purchase software/apps/cloud services//web services.

  1. Business Purpose: Provide a University Business reason and Institutional benefit to the University.

2.     Risk Review: Campus policy requires protection of university data and minimization of risk to that data. These requirements are found in the Cybersecurity Risk Management policy and the Institutional Data policy. Questions about risk reviews can be sent to Susan Weier at scweier@wisc.edu.

a.     The requestor should fill out the Risk Review Intake form at https://go.wisc.edu/zx8et7.

                                               i.     The intake form initiates a preliminary risk review. The form gathers information about the product or service, the intended usage, the type of data used, and the number and role of people using the product.

                                              ii.     The data may be shared with the Instructional Design Center staff if the product will be used for teaching and learning. Instructional tools typically incur more risk.  

b.     If the product or service is judged to be low risk, a statement describing the risk level is sent to the requestor and L&S Purchasing.

c.     If the product or service incurs moderate or high risk, it may be sent to the Office of Cybersecurity for a risk assessment. The risk assessment provides an estimate of risk and recommended methods to mitigate the risk. You can find more information about risk assessments at the Risk Management and Compliance website.

d.     The L&S Risk Executive, Dean Wilcots, must accept the risk as part of the purchase process.

3.     Instructional review: Is the Software/Apps/Cloud/Web service providing functionality that is already available through an existing software or service offering from a vendor with whom the UW already has a contractual relationship?

a.     Check the Campus Software Library for similar software:

b.     If the risk review intake form (above) is filled out for an instructional tool, the information will be shared with the consultants at the Instructional Design Center.

c.     Consult the staff at the Instructional Design Center at L&S Administration.

 

4.     Accessibility Review: The Digital Accessibility policy is expected to be approved and published sometime during Fall semester, 2021. At that time, an accessibility review may be required for certain products or services. The Center for User Experience conducts accessibility reviews on request.

Once the reviews have been completed, Purchasing Services needs to review Terms and Conditions of the vendor’s agreement to make sure they are in compliance with University policies and State Statutes. Most often, Purchasing has to negotiate some of Clauses of Terms and Conditions with the vendor. If an agreement or a contract is involved, it has to be reviewed and signed by Purchasing Services staff.

Purchasing Services can be reached at purch@bussvc.wisc.edu.

Other Items to Keep in Mind

 Approvals from Office of Cybersecurity, Purchasing Services and/or Legal Services needs to be attached to the purchase request.

      Software/software subscriptions should be in the name of the Department if possible.  All contact information must be University information.  University funds should be used to directly pay for the software/software subscriptions, such as a purchasing card, department card, requisition or direct payment.  It is not advised that software/software subscriptions be purchased by an individual and put through e-Reimbursement to be reimbursed, however that is an option if paying using a University method is not an option.

      Apps/Software, Cloud/Web services needs to be loaded/used on a University owned equipment/device. Exceptions to this should be addressed through the risk review.

 

 

 



Keywords:
App, Application, Software, Cloud, Web, Service, Cybersecurity, Data, Risk, Devices 
Doc ID:
112778
Owned by:
Michele G. in L&S KB
Created:
2021-08-02
Updated:
2024-10-31
Sites:
L&S KB