Policy Purpose
This Third-Party Security Risk Management Policy establishes university security requirements for the use of third-party services, products or related processes that:
• Handle USC information; either by accessing, storing, processing, transmitting, or receiving data, for hardware and software products, support and maintenance, service or solution providers, and Information Technology (IT) services.
• Maintain a separate, but trusted network connected, to the USC network and provide services for, on behalf of, or in conjunction with USC.
Please view policy to access additional details.