Documentation
HECVAT Full v3.0.6
Consulting
CONS-07

Question CONS-07

Is it encrypted (at rest) while in the consultant's possession?

Weight25
High RiskNo
RequiredNo
Compliant AnswerYes

Standard Guidance

EDUCAUSE provides no guidance here

Answering "NO"

EDUCAUSE provides no guidance here

Answering "YES"

EDUCAUSE provides no guidance here

Reason for Question

Consultants are often used to implement, maintain, fix, and assessment technology environments. In these cases, third-party consultants have access to institutional data, and appropriate access, whether remote or onsite, must be protected during the consulting engagement.

Follow-Up Inquiries

Follow-up inquiries will be institution/implementation specific.

HECVAT Pro Advice

[Add expert insights and best practices]

Implementation Tips

[Add practical steps for SME SaaS vendors]

FAQ

[Add common questions related to this HECVAT item]

Resources

[Add links to relevant articles or tools]