The Information Communication Technology (ICT) Review process is part of 精品SM在线影片鈥檚 commitment to making the resources and tools used on campus accessible and secure. 鈥婽here are two main areas assessed as part of ICT Procurement Review: Accessibility Risk and Information Security Risk.

CU Accessibility Policy听

In accordance with the 精品SM在线影片 Accessibility of Information and Communication Technology policy and standards, any Information Communication Technology (ICT)听products and services that the University buys, creates, uses and maintains must be reviewed and made accessible in compliance with University standards and Federal requirements.

Federal Laws, Regulations, and Standards听for Accessibility听


The ADA听prohibits discrimination and听ensures equal opportunity for persons with disabilities in employment, State and local government services, public accommodations, commercial facilities, and transportation. 听The current text of the ADA includes changes made by the ADA Amendments Act of 2008 (P.L. 110-325), which became effective on January 1, 2009.


The Rehabilitation Act听is a civil rights law that prohibits discrimination on the basis of disability in programs and activities, public or private, that receive federal financial assistance. Section 504 does not provide funding for special education or related services, but it does permit the federal government to take funding away from programs that do not comply with the law.


Section 508听was enacted to eliminate barriers in information technology, open new opportunities for people with disabilities, and encourage development of technologies that will help achieve these goals. The law applies to all Federal agencies when they develop, procure, maintain, or use electronic and information technology.


This updates federal communications law (2010) to increase the access of persons with disabilities to modern communications. The CVAA makes sure that accessibility laws enacted in the 1980s and 1990s are brought up to date with 21st-century technologies, including new digital, broadband, and mobile innovations.


These guidelines听were听developed in cooperation with individuals and organizations around the world听with the goal of providing a single shared standard for web content accessibility that meets the needs of individuals, organizations, and governments internationally.

Security Policy

The security review ensures a supplier's products and services meet the University鈥檚 technological standards, have been vetted for security features by the University or an authorized third party, and are capable of protecting University data at all times.

This audit of products and services is designed to ensure vendors听meet听the highest security听standard in the following areas:听