Why IIT Performs Reviews for Applications, IT Hardware, and Related Services

Why IIT Performs Application, Hardware, and Service Reviews:

  1. Ensuring IT Security: Security is one of the most critical aspects of our reviews. With increasing cyber threats and data breaches, it is essential to ensure that every application and hardware device we deploy meets stringent security standards. We assess whether the software or hardware could introduce vulnerabilities, threaten data privacy, or compromise sensitive information, particularly student records and institutional data.

  2. Verifying Licensing Compliance: Proper licensing is necessary for legal and financial accountability. Our reviews ensure that all software and services adhere to licensing agreements and avoid penalties from non-compliance. This protects our institution from costly legal issues while ensuring that applications are used in accordance with vendor agreements.

  3. Streamlining Deployment and Compatibility: We evaluate how easily new software and hardware can be deployed across our institution. This includes examining whether they integrate smoothly with our existing infrastructure, including key systems like our Canvas LMS. Ensuring compatibility minimizes disruptions and ensures that applications and hardware can be efficiently deployed and maintained without negatively impacting daily operations or instructional activities.

  4. Managing Databases and Roles: Applications that involve database access or role management require careful scrutiny. We review how data is stored, accessed, and shared to prevent unauthorized access. Additionally, we assess whether role-based access controls are in place, ensuring that users only have access to the data and features they need for their role, safeguarding sensitive information.

  5. Promoting Accessibility: Accessibility is a priority for our institution, especially for our students and users with disabilities. Every application or service we review is checked against accessibility standards, such as WCAG 2.1, to ensure that it can be effectively used by all members of our community. This ensures compliance with legal requirements and promotes an inclusive learning and working environment.

  6. Evaluating Integration with Learning Systems: Many applications and services need to integrate with our core learning management system (LMS), Canvas. As such, a critical part of our review process is ensuring that any new tools will work seamlessly with Canvas and other critical systems, enabling faculty and students to use these tools without disruption.

  7. Cost and Resource Efficiency: The review process also involves an evaluation of the costs associated with purchasing, deploying, and maintaining the application or hardware. This ensures that our technology investments are aligned with our institutional goals and budgets, and that we are using resources efficiently.

The Review Process: When an application or hardware request is submitted, it undergoes a multi-step review involving teams across different departments, such as IT Security, Licensing, Asset Management, Instructional Technologies, Accessibility, and Database Management. Each team evaluates the request from their area of expertise, ensuring the application or hardware meets all necessary standards. If a tool is found to be high-risk or incompatible, alternatives are explored and recommended.

Why This Matters: By performing thorough reviews of applications, IT hardware, and related services, we safeguard the institution's operations, protect sensitive data, and ensure that all technology serves the needs of our students, faculty, and staff. Our review process is designed to maintain the integrity of our technological ecosystem while promoting innovation and accessibility.

Contact Information: For any questions or to initiate a review request, please contact the Technical Service Desk at 410-777-HELP (4357).