About IT Purchasing


Centralized IT Purchasing was initiated to:

  • Standardize IT Resources and Efficiencies
  • Ensure Consistent Equipment Refresh Cycle
  • Leverage Economies of Scale
  • Campus-wide Enterprise Licensing

 and comply with:

  • CSU Accessible Technology Initiative
  • University Information Security Requirements

Compliance with CSU Accessible Technology Initiative

The CSU mandates all campuses make its programs, services, and activities accessible to individuals with disabilities. This includes students, faculty, staff, and the general public who visit or attend a campus sponsored event. Section 508 of the Rehabilitation Act of 1973 requires the University, including self-support and auxiliaries, to apply accessibility standards to all Information Technology products and services that it buys, creates, uses and maintains regardless of cost or funding source. CSU Fullerton is committed to using the most accessible technology products and services on our campus. The University cannot guarantee 100% compliance with all needs and concerns, but every effort will be made to achieve compliance or alternate accommodation.

Compliance with the University Information Security Office

The University Information Security Office is responsible for the security of all protected information collected, used, maintained, or released by the University as well as assuring campus compliance with Federal, State, CSU and Campus Information Security mandates. For this reason, all cloud-hosted software applications and any other IT product or service comprising University data requires thorough evaluation to ensure data being transmitted to a cloud environment is safeguarded.

IT Purchase Request

The electronic IT Purchase request form initiates and documents the review process of IT products/services to ensure our campus adheres to CSU policy. The form must be completed by the purchase requester, reviewed for compliance, and approved by an IT/ATI subject matter expert prior to proceeding with the purchase.

The duration of the review process will vary based on campus peaks times (start of a semester, fiscal year-end, etc.), the product/service type, and timeliness of suppliers in providing a VPAT and/or resolving contractual provisions as deemed necessary by the Information Security Office.

Thanks for your patience and support in certifying the products and services Cal State Fullerton procures are accessible and secure.

For more details about what's involved in the process, please visit the IT Purchasing Process page.

For general questions, to report an issue with the electronic form, or to provide the team with feedback, please send an email to dl-itpurchasing@fullerton.edu.