PS-7 External Personnel Security
Last Review: 10/1/22
Statement
The university establishes personnel security requirements including security roles and responsibilities for third-party providers and monitors provider compliance.
Applicability
This Control applies to all West Texas A&M network information resources. The intended audience for this Control includes all information resource owners, custodians, and users of information resources.
Implementation
- Third parties requiring access to University information resources shall have a legitimate business need for such access.
- Access must be sponsored by a current University employee and approved by the University President, Provost, or the Chief Information Officer/IRM.
- Access will be promptly removed by IT after being notified of the end of any service agreement or completion of project.
- Third-party providers shall notify their University sponsor and IT of any personnel transfers or terminations of third-party personnel who possess university credentials
- IT shall monitor provider compliance.