Skip to main content
Penn Information Systems & Computing Systems Home

Search form

Getting system status
  • Get Started
    • IT Staff
    • Faculty
    • Staff
    • Students
    • Alumni & Guests
    • ISC Staff
  • Services
    • — Services A to Z —
    • Accounts, Access & Security
      • Access Management Services
      • Active Directory
      • Identity Management Services
      • Information Security Services
    • Applications & Data Analytics
      • Application Development & Delivery
      • Data Analytics
        • Data Analytics at Penn
      • Integration Development & Delivery
    • Backup, Storage & Platforms
      • BackItUp
      • Cloud Solutions
      • Data Center & Colocation Solutions
      • Database & Application Platform Support & Consulting
      • Endpoint Management
      • Recovery Solutions
      • Storage
      • Virtual Desktop
      • Virtual Server Hosting
    • Community, Support & Learning
      • Classroom Technology Services
      • Desktop Engineering
      • IT Community Events
      • LinkedIn Learning
      • Tech Center
    • Consulting & Professional Services
      • Brokered Products
      • HireIT
      • Systems Support & Consulting
      • Technology Forecasting
    • Email, Calendaring & Collaboration
      • Classlists
      • Penn Email Routing
      • PennBox
      • PennNet Mailing Lists
      • PennO365
      • PennZoom
      • SMTP-Relay
      • Secure Share
    • Networks & Connectivity
      • Firewall Services
      • Network Design & Installation
      • PennNet
        • Network Names & Numbers
        • MAGPI (Penn's Internet2 Regional Optical Network)
      • PennNet Ethernet Ports
      • Wireless at Penn
    • Phone, TV & Video
      • Contact Center
      • Live Video Streaming
      • Penn Video Network
      • PennFlex Phone
      • Traditional Telephony
      • Video Content Management
      • Video Production
        • Producing Video Content
    • Web Hosting
      • Web Hosting Service
    • — Service Rates —
    • — Service Level Agreements —
  • Security
    • Office of Information Security
    • Security Services
    • Special Projects
    • Policies & Procedures
    • Training & Awareness
    • Penn SecureIT program
  • Collaborations
    • Computing Policies
    • Engaging Penn’s IT Community
    • Identity & Access Management
    • Penn IT Strategic Plan
    • Cloud First
    • Next Generation Unified Communications
    • Penn Bot
    • IT Advisory Groups
      • Common Solutions
      • IT Roundtable
      • Network Policy Committee
      • Penn Technology Investment Committee (PTIC)
        • About PTIC
        • The PTIC IT Development Fund
    • Special Interest Groups (SIGs)
      • Audio-Visual (AV-SIG)
      • Cloud Computing (Cloud-SIG)
      • Data Visualization (DataViz-SIG)
      • Developer SIG (Dev-SIG)
      • High-Performance Computing (HPC-SIG)
      • Instructional Technology SIG
      • Linux SIG
      • Macintosh Networking Group (MacNet)
      • Mobile Technologies (Mobile-SIG)
      • O365 Special Interest Group
      • PC Networking Group (PC-Net)
      • Project Partners SIG
      • Security SIG
      • Social Media SIG
      • Splunk Special Interest Group
      • Super User Group (SUG)
      • Web SIG
    • Technology Services Strategy Review Board
  • News
  • About
  • Hot Topics
  • Get IT Help

You are here

Home » Vendor Security Technical Assessment of Risk (V-STAR)

Vendor Security Technical Assessment of Risk (V-STAR)

New technologies continue to provide unique opportunities to enhance teaching, learning, and collaboration. Office productivity software, shared disk space, project management software, hosted email, survey tools, and even high-performance computing clusters are now available with little more than a web browser and an internet connection. These and countless other hosted services empower individuals to get more done faster.

With these services come serious issues that must be understood and considered before placing Penn data in the hands of a third party. A closer look at these issues and solutions will go far in minimizing your risk of data loss, service outages, foreign government access, inadequate technical support, non-compliance, and other concerns.

The following tools and guidance help you navigate when it is permissible and advisable to share Penn data with others:

  • Know the Risks. In March of 2010, Penn issued an Almanac guidance entitled Cloud Computing: Opportunities Used Safely regarding using Penn data with cloud vendors. The guidance also describes instances where it is unlawful to share Penn data. For example, sharing student records or HIPAA-protected data without appropriate contact language is not permissible. The guidance explains information security risk areas such as your data being unavailable when needed, confidential data being breached due to poor security practices, compliance with export control laws, and other important considerations.
  • Use Due Diligence in Selecting Vendors. Conduct due diligence regarding the privacy and security safeguards of the third party:
    • Consult the Penn Data Risk Classification.
    • Ask the vendor to complete the Vendor Security Technical Assessment of Risk (V-STAR) tool.
    • Vet the third party and the agreement appropriately based on the sensitivity of the data.
    • Take Vendor Security Technical Assessment of Risk (V-STAR) online training on Workday Learning to learn how to evaluate vendors' answers on the V-STAR tool. 

If you need additional guidance, contact the Privacy Office (privacy@upenn.edu) or the Office of Information Security (security@isc.upenn.edu).

Visit ISC on LinkedIn

Print
InfoSec Home
Resources
  • Evaluating Third Parties
  • Penn Data Classification
  • Information Security and Privacy Program Charter
  • Penn Privacy
  • SPIA Assessment
Contact InfoSec
  • Computing Policies
  • Tech Jobs @ Penn

© 2025 THE UNIVERSITY OF PENNSYLVANIA — 3401 Walnut Street, Philadelphia, PA 19104 — Report accessibility issues and get help — For ISC Staff