Third Party Data Transfer Procedure
This procedure standardizes the way data is transmitted/transferred between the University’s IT Resources and non-University controlled systems.
This IT policy, and all policies referenced herein, shall apply to all members of the University community including faculty, students, administrative officials, staff, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.
Transmission of data, to or from the University, and a third-party, must be reviewed and approved by the University Information Security Office (UISO), per the Third-Party Data Transfer policy.
The requestor must submit a service request on EasyVista from the My Apps tab on My.Fordham.edu to initiate a Third Party Data Transfer request.
- Type “Third Party Data Transfer” in the search field under “Search the service catalog:”
- Add “Third Party Data Transfer” to the cart.
- Click the “Create Request” button.
- To create the request, click on the red question mark.
- Complete all the required fields on the request form.
- You may use the Additional Information text box to provide the processors' details that are not included in the form (e.g., additional contacts, specific instructions, notes).
- Click the “Next” button to continue.
- Click the “Next” button again to create the request.
- Make any necessary adjustments to the fields on the Create Request pop-up (i.e., change the Recipient name if you are completing the form on behalf of another person).
- Click the “Next” button.
- Click the “Finish” button.
- EasyVista notifies all related parties of the request via email.
- The University Information Security Office will have the opportunity to review the submission and either approve or reject the request.
- If the request is rejected, all parties mentioned in the request ticket will receive an email notification.
Note: If a request is rejected, you will need to modify your request and submit a new ticket.
IT Resources include computing, networking, communications, application, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.
Provisioning is the term used for providing specific account access.
Related Policies and Procedures
- Data in Transit Policy
- Data Classification Policy
- Data Classification Guidelines
- Third-Party Data Transfer Policy
|Responsible Person||Director, IT Security|
|1.0.1||03/18/2020||Updated to statement|
Policy Disclaimer Statement
Deviations from policies, procedures, or guidelines published and approved by the University Information Security Office (UISO) may only be done cooperatively between the UISO and the requesting entity with sufficient time to allow for appropriate risk analysis, documentation, and possible presentation to authorized University representatives. Willful failure to adhere to UISO written policies may be met with University sanctions.