Evaluate vendor security / HECVAT

Body

Problem

  • How are vendor security assessments evaluated by ISO?

Scope

  • The primary goal of HECVAT is to:
    • Provide a common language for security assessments
    • Allow schools to verify that a vendor's products meet strict regulatory requirements and institutional safety standards
    • Ensure institutions can protect sensitive campus data and ensure that external partners operate with the same level of integrity as the institution itself
    • Miami staff and faculty may use this documentation as a reference to how HECVAT is evaluated by ISO

Resolution

Definition: What is HECVAT?

  • The Higher Education Community Vendor Assessment Toolkit (HECVAT) is a critical framework utilized by colleges and universities to rigorously vet the security and privacy protocols of third-party service providers
  • HECVAT is a standardized assessment framework designed specifically for the unique needs of the higher education sector. It functions as a comprehensive questionnaire that vendors complete to disclose their information security practices

 

The Assessment Process

The HECVAT workflow is designed to move from data collection to informed decision-making through three distinct phases:

 

1. Vendor Submission

The process begins when a prospective vendor fills out the HECVAT questionnaire. This document is exhaustive, requiring the vendor to provide detailed evidence regarding:

  • Data Protection: How information is encrypted and stored
  • Incident Response: Plans for managing and reporting data breaches
  • Compliance: Alignment with standards like FERPA, HIPAA, or GDPR

 

2. Review & Validation

Once submitted, the institution’s information security team performs a deep dive into the responses.

  • Initial Screening: Checking for "deal-breakers" or missing information
  • Verification: The team may request SOC2 reports, conduct follow-up interviews, or perform technical audits to ensure the vendor’s claims match their actual practices

 

3. Risk Analysis and Final Decision

The final stage involves weighing the vendor’s security posture against the specific needs of the project.

  • Sensitivity Check: Is the vendor handling public directory info or sensitive student records?
  • Stakeholder Review: Security experts and department leaders review the final risk profile
  • Outcome: The vendor is either approved, rejected, or asked to implement specific security remediations before a contract is signed

Notes

User

  • Miami University Staff and Faculty

Environment

  • IT Services Security, Compliance and Risk Management

 

Details

Details

Article ID: 170021
Created
Mon 5/4/26 10:40 AM
Modified
Thu 5/7/26 2:40 PM
Supported Office or Community
University Community of Students, Staff, and Faculty