What is JotForm?
JotForm is a free online form builder which helps you create online forms without writing a single line of code. No sign-up required.
At JotForm, we want to make sure that you’re getting the online form builder help that you need. Our friendly customer support team is available 24/7.
We believe that if one user has a question, there could be more users who may have the same question. This is why many of our support forum threads are public and available to be searched and viewed. If you’d like help immediately, feel free to search for a similar question, or submit your question or concern.
Vendor Security EvaluationAsked by rachelclark2255 on September 12, 2014 at 04:52 PM
I am a new user of JotForm looking to use it for a scholarship application. I am an employee of a state university, and need to ensure that JotForm is secure to use for the data we will be collecting from the application.
Vendor Technical Security Evaluation
Revised June 2, 2014
UT Dallas takes seriously its responsibility to protect information assets on behalf of stakeholders such as students, faculty, staff, and the citizens of Texas. When engaging vendors to perform information processing or enable software capabilities, a vendor evaluation is performed to ensure that reasonable controls are in place to manage risk. The questions below have been designed to gain a better understanding of the current processes and protections that a vendor is able to offer UT Dallas. Please respond to the extent the question is applicable, or note when a particular question may not be applicable.
Completed surveys will be analyzed and follow-up research may be performed at the discretion of the Information Security department.
Not all vendor relationships have the same risk profile. The Information Security department may waive the need for a completed Vendor Evaluation form for lower risk scenarios. Factors that may contribute to higher risk include the transfer of UT Dallas data to the premises of a vendor, providing a vendor with network connectivity to UT Dallas, handling data with associated regulatory requirements, or entering into vendor relationships that could pose risk to the reputation of UT Dallas.
Questions and concerns may be directed to email@example.com.
1. Provide name, title, and contact information for the vendor representative providing answers below.
2. Provide a general description of the product or service to be provided to UT Dallas, including the problem to be solved or business need to be fulfilled by this new vendor relationship.
3. Describe all data elements that will be provided to the vendor. Examples of data elements include, but are not limited to, social security number (SSN), class grades, medical records, or credit card numbers.
4. Will UT Dallas information will be accessed, stored, or processed at locations outside of the physical control of UT Dallas? If so, will locations be within the United States or outside?
5. Will the product or service be entirely supported by the vendor, or will the vendor also share UT Dallas information with subcontractors? Subcontractor relationships should be described, including the locations of their operations. Will subcontractors be subject to the same security policies and procedures of the vendor contracted by UT Dallas?
6. UT Dallas is subject to various state and federal compliance frameworks. Information shared with vendors is subject to such compliance. Please indicate all applicable compliance frameworks and demonstrate that such compliance has been achieved. Examples include, but are not limited to, FERPA, HIPAA, PCI DSS, and GLBA.
7. Various forms of documentation will help UT Dallas understand the safety and soundness of vendor operations which might affect data security. Examples of such documents include Information Security Policy, SSAE16 (SOC I, II, and III) or SAS70, ISO 27000 certification, IT Audit reports, web application security tests (i.e. OWASP vulnerabilities), and Business Continuity / Disaster Recovery plans and test results. Please provide copies of applicable documents.
8. Are employees who will have access to UT Dallas information subject to background checks and are they required to sign a confidentiality agreement indicating they will not copy or misuse information they have access to in performing their job responsibilities? Describe processes in place to mitigate risk at the time an employee terminates, including remove of logical access and collection of physical assets.
9. Describe data retention and destruction procedures, including methods, timeframes, and applicability during contract, at conclusion of contract, and in the event vendor is acquired or terminates business operations. In the event that UT Dallas data retention and destruction requirements vary from those described, please describe the process to adjust vendor’s procedures to match UT Dallas expectations.
10. UT Dallas expects timely notification of both possible and confirmed data breaches before any other parties are notified. Please describe the communication protocols by which vendor will interact with UT Dallas Information Security including maximum timeframe needed to provide notification.
11. If UT Dallas detects a security or performance concern, please describe the process to obtain vendor support. Distinguish between routine and emergency requests.
12. Provide a technical architecture description or diagram indicating the flow and storage of UT Dallas information between UT Dallas and the vendor’s environments, including subcontractor environments. Include a list of vendor-owned IT assets supporting the contracted product or service, as necessary.
13. Describe the user access architecture you recommend for this product or service. If UT Dallas user credentials will be leveraged, will your systems be compatible with our existing directory services environment? Will vendor maintain a separate database outside of UT Dallas control containing user credentials? How will credentials be encrypted when stored and transmitted?
14. How will data be transported between UT Dallas and the vendor? What method(s) of connectivity will be established and what risk mitigation controls will be utilized, such as encryption of data in transit and data at rest?
15. In addition to encryption methods, please provide general description of the security controls and processes in place to protect UT Dallas information when accessed, stored, or processed in the vendor’s environment. For example, assignment of least necessary user access privileges, formal change control, standardized configurations, backup procedures, timely patch management procedures, event monitor and response.
16. Describe the physical security and environment control capabilities in place for data centers and work spaces where UT Dallas information may be accessed, stored, or processed.
I highly recommend to instead redirect your inquiry via the email support at firstname.lastname@example.org.
This way the appropriate personnel will be able to provide the response on your inquisitions.