The review criteria used for each tool can vary, depending on the functionality and purpose of the tool. The selected criteria presented here illustrate the types of questions specialists typically ask. For a more complete list, click ‘Read more’ within each category.
Instructional Technology— Read more |
eee@uci.edu (949) 824-2222 http://eee.uci.edu/ |
- How does this tool facilitate learning?
- Will all students be able to access this tool on all devices?
- Is this tool accessibility-compliant?
- How will instructors assess student activities on the tool?
- What kind of support will instructors and students receive for this tool?
- Who owns the material that is stored within the tool (i.e. if I put data in the tool, do I give up ownership rights)?
- How long will the work be stored in the tool (i.e. one year after the course)
- Are there tools available on campus that perform the same function?
- Are there tools that perform the same function and integrate with existing UCI systems?
— Read more about instructional technology
Privacy— Read more |
security@uci.edu (949) 824-2222 https://security.uci.edu/privacy/ |
- Does the vendor understand UCI’s strong requirements and commitment to privacy?
- Does the vendor have a detailed privacy policy?
- Who can access your personal information and what can they do with it?
- What happens if there is a legal demand for data (i.e. public records, subpoena)?
- Will the vendor censor activity they consider offensive?
- Are there appropriate access controls to ensure that only authorized people can access the data stored in the system?
- Can the vendor sell your information to advertisers or other third parties?
— Read more about privacy
Student Records— Read more |
registrar@uci.edu (949) 824-9672 http://reg.uci.edu/privacy |
- Does the tool or resource maintain a ‘student record’?
- Is student information required (i.e. enrollment information, email, name)?
- How are accounts created and/or maintained within the tool or resource?
- How are the student records protected?
— Read more about student records
Security— Read more |
security@uci.edu (949) 824-2222 https://security.uci.edu/ |
- Does the vendor take appropriate measures to protect data?
- Is there risk or harm if the data are exposed to unauthorized individuals?
- Does the vendor meet the data compliance requirements?
- Could someone steal research or intellectual property?
- Will the vendor willingly cooperate if they have a data breach?
— Read more about security
Data Ownership & Legal Liability— Read more |
riskmgmt@uci.edu (949) 824-6516 http://mrm.uci.edu/ |
- Are we responsible for liability created by the vendors acts or errors?
- What happens if data is illegally stolen from the cloud?
- Who owns the data placed into the cloud?
- Can changes in business processes affect liability?
- Could I have personal liability for agreements signed without University approval?
- Does my use of the system create unwanted liability for the University?
- Who is responsible for what happens to the information that is stored in the tool?
- What happens to the data at the end of the agreement or if we stop using the tool or resource?
- What portions of the service are covered under an agreement?