NEOMED Technology Procurement Procedures


Refer to the Technology Procurement Policy.

All procurement of University technology must operate effectively within the University’s technology environment, satisfy University security standards, follow established University purchasing policies and guidelines, satisfy proper licensing and grant requirements, and have defined expectations for the technology’s implementation, support, maintenance, network connectivity, and lifecycle replacement; therefore a technology assessment is required before technology is approved or procured for use at or by the University.

Technology procured outside of the scope of University policy will be prohibited from connecting to University Systems, including the university Network, and such technology will not be eligible for University technology support.

How Do I Engage IT?


All requests for technology procurement should start out as a Help Desk ticket.


*Please note that requests for the procurement and implementation of technology should come to IT after they have approval from a department Director or Dean and per the University Purchasing and Selling University Property policy, competitive quotes or an request-for-proposal (RFP)/sealed bid may be required depending on the purchase amount.


What Does an Assessment Entail?


Depending on the scope of the request, a technology assessment may be required once a Purchaser has identified the technology intended for procurement. The Purchaser will need to work with the technology vendor or third party to gather any details needed as part of the assessment.


At a minimum, a technology assessment involves ensuring the following:

  • Compatibility with the University’s existing IT and security environment;
  • Compliance with University policies and applicable laws and regulations;
  • Alignment with the University’s Strategic Plan and IT standards;
  • Availability of IT resources for evaluation, testing, and implementation, if applicable;
  • Accessibility of the technology;
  • Documentation of high level and detailed requirements;
  • Identification of service providers/technology;
  • Demonstration(s) of the technology;
  • Completion of reference/customer checks;
  • Rating/scoring of service providers/vendors;
  • Proof of concept or trial use, if possible; and
  • Data security requirements are included in the technology agreement(s) or contract(s)
Was this helpful?
0 reviews


Article ID: 16477
Wed 9/14/16 4:33 PM
Tue 7/27/21 12:19 PM