​​​​​​​​​​In accordance with CMU policy and Federal and State laws, technology products and services must be appropriately accessible, meet campus security standards, and be technically supportable.  This acquisition process is designed to ensure that these standards are met, any residual risk is appropriately managed, and all ​purchases are appropriately cost effective. This process applies to information technology products and services in the categories listed below:

  1. Desktops, Laptops and Tablets, including iPads (except as listed here)
  2. Printers, including 3D printers (except as listed here)
  3. Web-based services and applications such as storage/sharing services, online courses, web conferencing tools, online business services, etc (click here for more information​)
  4. Software of single or bulk licenses costing more than $500 (Please note, you cannot individually purchase software covered as part of an enterprise agreement)
  5. Computer Monitors costing more than $300 (per unit), click here for examples.
  6. Video and Digital cameras costing more than $500 (per unit)​
  7. Servers and Enterprise Storage
  8. Networking equipment
  9. Security Cameras
  10. Audio-Visual, TVs, Projector, video conferencing, other Mediation and supporting software, that is intended to be installed or mounted permanently​, ​​​click here ​for examples.​
  11. Unmanned Aerial Vehicles (UAVs, a.k.a. "Drones")​
Securing appropriate approval for technology purchases is ultimately your responsibility, and all technology purchases meeting the above qualifications will require completion of the Technology Acquisition Checklist (TAC)​.  In the case of purchases directly though Purchasing, your buyer will request its completion.  In the case of business card purchases, you will be expected to print and submit a copy of your TAC approval email with your monthly business card reconciliation.​

The Office of Information Technology (OIT) will review and sign-off on these requests. OIT will engage with the submitter should additional information be required.​


In most cases, the depth of review is minimal and can be performed relatively quickly. However, the length of review may vary depending on whether compliance documentation already exists, and if not, how timely and thoroughly the contractor can be in providing the required documentation. Selecting compliant products and services, and providing as much detailed information as possible, will accelerate the review process.​

Please note that any CMU owned standalone computing device (runs an operating system and provides an end user with an interactive graphical interface) that is capable of network connectivity must have an asset tag, so that it can have a “name” / label according to a predefined naming schema.  Naming devices according to a unique and predefined number is essential to support in that it allows technical support personnel to determine the appropriate support group, query information about the asset in CMU’s ERP system, and locate the device both in-person and over the network.  Peripherals (printers, scanners, monitors, etc) below the $5000 threshold need not have an asset tag number.


Contacts for More Information:

OIT, Coordinator Admin Services and Software Licensing – Kim Vogel, 1771, vogel1kc@cmich.edu

Contracting and Purchasing Services, Senior Buyer – Jennifer Bronz, 3141, bronz1jl@cmich.edu

Chief Information Security Officer – Mark Herron, 7445, herro1mf@cmich.edu​​