Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Table of Contents:
Anchor
Top
Top

...

...

...

...

...

...

...

...

...

...

Anchor
Purpose
Purpose

Purpose:

To provide sample proposal and contract language for common themes related to data protection as well as practical guidance as to when and how to consider the themes when drafting or reviewing a request for information (RFI), request for proposal (RFP) or contract.
#TopTop

Anchor
Disclaimer
Disclaimer

...

For the foregoing reasons, it is essential that any intended use of the sample requirements and contractual clauses be reviewed by appropriate institutional legal counsel in the full context of the proposal requirements and contractual arrangement prior to communication to the other contracting party and during negotiation of terms. Ultimately, the greatest concern should be that the final negotiated result accurately reflects the intention of the parties and the reality of the situation.
#TopTop

Anchor
References
References

...

NOTE: Sample RFP requirement questions and contractual clauses have been sanitized and identifying information related to a particular institution of higher education has been removed. In addition, while all of the references provided by working group members were reviewed, the working group stopped adding sample questions and clauses to this document once we accumulated several samples for each theme (unless one of the references included a unique wording or clause that was not already addressed). Institutions of higher education are encouraged to add their own sanitized sample questions and clauses as a way to make this document "living" following the uniqueness principle.
#TopTop

Anchor
Background
Background

...

The challenge facing individuals responsible for drafting and reviewing RFPs and contracts for the purchase of information technology products and services - often individuals with job functions other than legal counsel - is, considering the nuances and particularities of each contract, knowing what clauses to include or look for in a contract and what clauses could be unnecessary or overburdening.
#TopTop

Anchor
Criticality
Criticality

...

Category 4: Recommended to address common situational requirements

#TopTop

Anchor
How to Use This Toolkit
How to Use This Toolkit

How To Use This Toolkit:

#The The Three Steps

As a practical approach to address the aforementioned challenge, this document divides the procurement of information technology products and services into three steps and organizes proposal and contractual language security themes around a decision tree consisting of four questions that an individual drafting or reviewing an RFP or contract should ask her/himself.

The basic idea is to consider each step and each question at a time in sequence and to select only those steps and themes that apply to the product or service being purchased and the data being protected. Nevertheless, as these processes are not necessarily linear, the individual may find a different approach worthwhile.
#TopTop

Anchor
The Three Steps
The Three Steps

...

Assuming that we already know "what" we are procuring and that we are now concerned with the "from whom" we procure it, the procurement process for information technology products and services can be divided into the following three general steps:1.

  1. Vendor Selection

...

  1. Contract Negotiation

...

  1. Contract Monitoring

#TopTop

Anchor
A Word About Requests For Proposals (RFP)
A Word About Requests For Proposals (RFP)

A Word About Requests For Proposals (RFP):

#Decision Decision Tree

An RFP is an invitation for vendors to submit a proposal on a specific product or service. RFPs are usually designed to get vendors to provide a creative solution to a business problem or requirement, bring structure to the procurement decision, and allow the risks and benefits of a solution to be identified clearly upfront. The creativity and level of detail that vendors choose to include in their proposals should be used to evaluate the quality of the vendors' proposals, their understanding of your business and requirements, and as a means of comparison against each other.

...

The Sample RFP Language provided in the themes below are intended to be just that - examples and a memory-jogger to assist in identifying specific items that may need to covered but are not.

#TopTop

Anchor
Decision Tree
Decision Tree

...

  1. What should be the Core Language that I should always have in an RFP or contract?
  2. Are the process and/or data covered in my RFP or contract impacted by a federal, state, or local law, regulation, or contractual obligation?
  3. Are there other common security items that apply to the process, product, service, or data covered in my RFP or contract?

Are there special conditions that I should consider? Am I missing something?

...

Top

Anchor
A Word About Third-Party Risk Assessments
A Word About Third-Party Risk Assessments

A Word About Third-Party Risk Assessments:

#A A Word About Contract Monitoring

...

  • Assess the risk of engaging the finalist, or top - two , third-party vendors. ; This can be done by requiring finalist vendors to complete a third-party information security assessment survey (see Resources below)like the Higher Education Cloud Vendor Assessment Tool developed by the HEISC Shared Assessments Working Group. 
  • Review the answers and identify "weak" points. Do the vendors provide additional documentation? Do responses pass the "smell test"?
  • Schedule a conference call with vendor contact person to go over the assessment results and the institution's requirements
  • Call vendor references to validate the assessment results and learn if there is evidence of non-performance at other clients sites
  • Identify areas needing mitigation and required cure and include them as language in final agreement and/or statement of work.

Resources:

#TopTop

Anchor
A Word About Contract Monitoring
A Word About Contract Monitoring

A Word About Contract Monitoring

#ThemesThemes

Monitoring can mean different things to different people. For the purpose of this document, monitor means to assess, to watch, to keep track of, or to check, usually, with a special purpose. It does not mean or imply to verify or even to test. Actually, monitoring is more of a spectrum that ranges from just "keeping an eye" in the low end to requiring a site audit in the high end. Given the availability of resources at institutions of higher education, verification could be an impractical and significantly costly requirement if applied to all or most third-party contracts.

...

It is important to keep in mind that contract monitoring is the last step of a cascading progression. The initial identification of process and data impacted as well as initial security requirements are used to formulate questions for the RFP. The answers to the RFP are used to evaluate vendors and refine the security requirements. The evaluation and risk assessment of finalists refine the security requirements that will, in turn, be added as language to the contract or statement of work. And, finally, it is the final contract and corresponding risk level that determine the appropriate contract monitoring approach.

#TopTop

Anchor
Themes
Themes

Themes

Sample contract clauses are available for each of the following themes:

#TopTop

Appendix 1
Appendix 2

...

(question) Questions or comments? (info) Contact us.

...