SKIP TO PAGE CONTENT

PS-7 External Personnel Security

Last Review: 10/1/22

Statement

The university establishes personnel security requirements including security roles and responsibilities for third-party providers and monitors provider compliance.

Applicability

This Control applies to all West Texas A&M network information resources. The intended audience for this Control includes all information resource owners, custodians, and users of information resources.

Implementation

  • Third parties requiring access to University information resources shall have a legitimate business need for such access.
  • Access must be sponsored by a current University employee and approved by the University President, Provost, or the Chief Information Officer/IRM.
  • Access will be promptly removed by IT after being notified of the end of any service agreement or completion of project.
  • Third-party providers shall notify their University sponsor and IT of any personnel transfers or terminations of third-party personnel who possess university credentials
  • IT shall monitor provider compliance.

Phone
Twitter
Facebook
Instagram
Mail