Skip to Content

Information Security Office
Policy Index
Managing Third Parties
Supplemental Policy
Number: 8040.0 Revised: August 15, 2010

Granting Access to Third Parties

Third party service providers may be granted access to campus information assets when needed to accomplish an authorized and necessary business-related task.  All such access must be documented in writing and authorized using procedures approved by the Information Security Officer.  All such access shall be based on the security principles of ‘need-to-know’ and ‘least required privilege’ and must be subject to ongoing monitoring and oversight by the Information Security Officer. Third parties are subject to all campus information security policies, standards, and processes.

Back to to Sacramento State Information Security Policy Website

Feedback/Questions/Comments