¾Ã¾ÃÈÈÊÓƵ

Skip to Main Content

Search for a Policy

Computer Hardware and Software Acquisition

Scope: Faculty, Staff, Contractors, and Miami sponsored volunteers are covered by this policy

Administrative

Computer Hardware and Software Acquisition

Policy 

General

Provided such additions do not substantially degrade service to other users, it is the policy of ¾Ã¾ÃÈÈÊÓƵ to permit the acquisition of computer peripheral devices and/or software within the limits of the operating budget and/or available extramural funding; the University statement of preferred, supported, and approved manufacturers; and the capacity or security of the host computers.

For purposes of this policy, computer peripheral devices are defined as any device which contains an electronic processor and which can be linked either directly or indirectly to the Miami Computing System Network (MUN).

Software includes general system programs and libraries, compilers, utilities, and other computer programs requiring central system support. For independently developed or acquired software, which will become an integral part of the University information processing system, a contact person in IT Services must consult/assist in the development to ascertain that the resulting system will be effective, meet security requirements, and can be maintained by IT Services should the need subsequently arise.

The implementation of this policy is the responsibility of the Vice President for Information Technology. The Information Technology Policy Committee recommends such policies.

Procedures

Hardware Acquisition 

It is the policy of ¾Ã¾ÃÈÈÊÓƵ to enable the acquisition of electronic computing devices within the limits of reasonable financial, security, serviceability, and accessibility requirements to support the University's mission. We recognize the need for a balanced and educated decision regarding hardware needs to support the University while mitigating risk and providing value for the University.

For purposes of this policy: Computer hardware is defined as any device that is used by or for the benefit of ¾Ã¾ÃÈÈÊÓƵ that is capable of running an operating system (physical or virtual), and these devices are typically managed by, and purchased with University funds. 

Hardware Request Procedures

Requests for the acquisition of hardware must be endorsed by IT Services to ensure technical compatibility, serviceability, accessibility, information security, and general ‘fitness’ for use within the Miami operating environment.

Requests for the acquisition of hardware and peripheral devices purchasing advice should be made by completing the 

Software Acquisition

It is the policy of ¾Ã¾ÃÈÈÊÓƵ to permit the acquisitions of software to meet the needs of the University provided that each purchase is reviewed by the VP of IT or designees for overall usage regarding; legal, licensing, deployment tracking, accessibility, security, and overall fitness for use within the Miami IT operating environment. 

For purposes of this policy; Software is defined as any programmatic code-based application (on-premise, vendor-hosted, cloud-based services), program, libraries, compilers, utilities, or any other variant of code-based technology.

Miami faculty and staff that wish to obtain software for university usage are required to engage directly with their Academic Director of Technology, their Divisional IT Representative, their Technical Support Staff, or directly with IT Services for guidance/assistance/support. This applies to ALL software, immaterial of cost, including zero cost (free), educational use, general public use, or any other legal definition that is used within the normal course of University operations and includes all instructional and general use by the university not previously defined.

The implementation of this policy is the responsibility of the Vice President for Information Technology. The Information Technology Policy Committee recommends such policies.

Software Request Procedures

Requests for the acquisition of software must be endorsed by IT Services to ensure technical compatibility, serviceability, accessibility, information security, and general ‘fitness’ for use within the Miami operating environment.

Please review the  information to determine if the application has been approved for use.  If the application does not appear within our Software Library it must go through the Software and Cloud Services Risk Review process.

Requests shall be reviewed on the following areas: technical specifications, pricing, proposed use, benefits, security, accessibility, expected utilization, and anticipated measurable outcomes for the benefit of the University.

Enforcement

In addition to obtaining endorsement for all ¾Ã¾ÃÈÈÊÓƵ IT acquisitions, systems, and users must comply with the ¾Ã¾ÃÈÈÊÓƵ Responsible Use of University Computing Resources policy including noted enforcement and sanction actions.

 


Related Form(s)

Not applicable.


Additional Resources and Procedures

Not applicable.


FAQ

Not applicable.


Policy Administration

Next Review Date

7/1/2025

Responsible Officers

Vice President for Information Technology and Chief Information Officer

Legal Reference

Not Applicable.

Compliance Policy

No

Recent Revision History

 Amended July 2022; Edited April 2023

Reference ID(s)

  • MUPIM 19.1
  • OAC 3339-19-01

Reviewers

Vice President for Information Technology & Chief Information Officer