Data Security Guidelines for outsourcing and third party compliance
People who source a service from a third party that would give them direct access to University data need to understand this document.
These guidelines support the Electronic Information Systems Security Policy.