Skip to main content
Skip to main site menu
University Information Security Office
Search
Menu
Search this site
Close the search box
×
Search
Requests for UIS Services
Security Standards
Toggle sub-navigation
Close this sub-navigation
Security Standards for Georgetown Technology
Risk Classifications for Georgetown Assets and Data
Toggle sub-navigation
Minimum Security
Toggle sub-navigation
Security Considerations for Cloud Services
Toggle sub-navigation
Be Cyber Smart!
Close
Requests for UIS Services
Open sub-navigation
Close sub-navigation
Security Standards
Open sub-navigation
Close sub-navigation
Security Standards for Georgetown Technology
Open sub-navigation
Close sub-navigation
Risk Classifications for Georgetown Assets and Data
Open sub-navigation
Close sub-navigation
Minimum Security
Open sub-navigation
Close sub-navigation
Security Considerations for Cloud Services
Open sub-navigation
Close sub-navigation
Be Cyber Smart!
Open sub-navigation
Close sub-navigation
500. 3rd-Party Security
Home
▸
500. 3rd-Party Security
UIS.501 Technology Vendor Security Policy
UIS.501.1 Cloud Services Selection Guidelines
UIS.501.2 Software-as-a-Service Guidelines
UIS.501.3 Platform-as-a-Service Guidelines
UIS.501.4 Supplier Risk Assessment Guidelines
UIS.501.5 Cloud Technology Services Agreement Guidelines
UIS.502.6 Website Hosting Guidelines