Software and Hardware Procurement Policy¶
Policy Status: Draft
This policy is currently draft.
Purpose¶
To standardize the procurement of technology hardware, software, and services, ensuring all acquisitions meet Acme Corp's security standards, compatibility requirements, budgetary constraints, and regulatory compliance while optimizing costs and maintaining vendor accountability.
Scope¶
This policy covers all technology acquisitions for Acme Corp, including:
Hardware: - End-user devices (computers, laptops, tablets, mobile devices) - Servers and storage equipment - Network equipment (routers, switches, firewalls) - Peripherals and accessories - Audio/visual equipment
Software: - Operating systems and system software - Business applications and productivity software - Development tools and platforms - Security software and tools - Mobile applications - Software licenses and subscriptions
Services: - Cloud services and SaaS subscriptions - Professional services and consulting - Support and maintenance contracts - Managed services - Software development services
Exclusions: This policy does not cover office supplies, furniture, or non-technology equipment.
Policy Statement¶
Procurement Authorization¶
All technology procurements must be properly authorized:
Approval Thresholds: - < $500: Department manager approval - $500 - $5,000: IT Team Lead + Department Head approval - $5,000 - $25,000: CTO approval - > $25,000: CTO + CFO approval - New Vendor: CTO approval required regardless of amount - Multi-year Contracts: CTO + CFO approval required
Emergency Purchases: - May bypass normal approval for critical business needs - CTO or designee can authorize up to $10,000 - Full documentation required within 48 hours - Retroactive approval process within 5 business days
Approved Vendors¶
Technology purchases must use pre-approved vendors when available:
- Preferred Vendors: Vendors with established contracts and negotiated pricing
- Approved Vendors: Vendors that have passed security and compliance review
- New Vendors: Require vendor assessment before use
- Vendor List: Maintained by IT and Procurement teams, reviewed quarterly
Vendor Approval Requirements: - Security assessment completed - Contract terms reviewed by Legal - Compliance requirements verified (HIPAA, SOC2) - Data protection and privacy commitments - Service level agreements defined - Financial stability verification (for major vendors)
Security and Compliance Requirements¶
All technology acquisitions must meet security standards:
Hardware Security Requirements: - Support for full disk encryption - Secure boot capabilities - TPM (Trusted Platform Module) for devices storing sensitive data - Regular security updates available from manufacturer - Minimum 3-year warranty and support commitment
Software Security Requirements: - Regular security updates and patches - Authentication and access control capabilities - Data encryption at rest and in transit - Audit logging capabilities - Vendor security certifications (SOC2, ISO 27001) - Privacy policy review and approval - Data processing agreement (DPA) for systems handling sensitive data
Cloud Service Requirements: - SOC2 Type II certification - HIPAA compliance (for systems handling health data) - Data residency in approved regions - Data portability and export capabilities - Backup and disaster recovery capabilities - Clear data retention and deletion policies - Service level agreement (SLA) with >99.5% uptime
Compatibility and Standardization¶
Procurements must align with existing technology standards:
- Standard Configurations: Follow approved standard configurations for hardware
- Operating Systems: Windows 11 Pro or macOS latest for end-user devices
- Office Suite: Microsoft 365 E3 or equivalent
- Browsers: Chrome or Edge (current version)
- Mobile Devices: iOS (latest-1) or Android (latest-1)
- Integration Requirements: Must integrate with existing systems (Active Directory, SSO, etc.)
- Exceptions: Require CTO approval with documented justification
Budget and Cost Management¶
Technology purchases must align with budget:
- Budget Allocation: All purchases must have approved budget allocation
- Total Cost of Ownership: Consider licensing, support, training, and maintenance costs
- Cost Comparison: Obtain quotes from multiple vendors for purchases >$5,000
- Volume Licensing: Leverage volume licensing and enterprise agreements when cost-effective
- Annual Review: Review all recurring costs annually for optimization opportunities
- Unused Licenses: Quarterly review to identify and eliminate unused licenses
Asset Management Integration¶
All procurements must be tracked:
- Asset Registration: All hardware and software registered in asset management system within 24 hours of receipt
- Asset Tagging: Physical asset tags applied before deployment
- License Tracking: Software licenses documented with purchase details, expiration dates
- Inventory Integration: Procurement data flows to asset inventory automatically
- Warranty Tracking: Warranty and support contract details recorded
Roles and Responsibilities¶
| Role | Responsibility |
|---|---|
| Chief Technology Officer | Approve IT strategy, major purchases, new vendors; ensure alignment with business needs |
| Chief Financial Officer | Approve budgets, review major expenditures, ensure financial controls |
| IT Team Lead | Evaluate technical requirements, recommend solutions, approve standard purchases |
| Procurement Manager | Manage vendor relationships, negotiate contracts, coordinate purchasing process |
| IT Team Members | Identify technology needs, submit purchase requests, evaluate products |
| Security Team | Review security requirements, assess vendor security posture, approve security tools |
| Finance Team | Process purchase orders, track spending, manage vendor payments |
| Department Heads | Approve purchases for their teams, ensure alignment with department needs |
| Legal Counsel | Review contracts, ensure legal compliance, negotiate terms |
| Requestor | Submit complete purchase request, provide business justification, coordinate receipt |
Procedures¶
Purchase Request Process¶
1. Identify Need¶
- Requestor identifies technology need
- Checks existing inventory for available resources
- Consults IT for approved alternatives
- Verifies budget availability
2. Research Options¶
- Review approved vendor list
- Research compatible products meeting requirements
- Obtain quotes from multiple vendors (if >$5,000)
- Compare features, pricing, support
3. Submit Request¶
- Complete purchase request form with:
- Detailed description of item/service
- Business justification
- Technical specifications
- Vendor information
- Cost estimate and budget code
- Urgency and timeline
- Attach quotes and supporting documentation
-
Submit through procurement system
-
Technical Review (IT Team):
- Verify technical requirements
- Confirm compatibility with existing systems
- Check for security and compliance requirements
- Validate against standards
-
Approve or request modifications
-
Security Review (if applicable):
- Security team reviews for new vendors or security tools
- Assess data protection and privacy
- Verify compliance requirements
- Request additional information if needed
- Approve or reject with feedback
4. Budget Approval¶
- Finance verifies budget availability
- Department head approves budget allocation
-
Route for appropriate spending approval
-
Executive Approval (if required):
- CTO approval for technical alignment
- CFO approval for financial commitment
- Legal review for contracts
5. Procurement¶
- Procurement team processes approved request
- Creates purchase order
- Submits order to vendor
- Tracks order status
6. Receipt and Verification¶
- Receiving team inspects delivery
- Verifies items match purchase order
- Reports any discrepancies
- Registers assets in asset management system
7. Deployment¶
- IT configures hardware/software per standards
- Tests functionality
- Deploys to requestor
- Provides necessary training/documentation
8. Invoice Processing¶
- Finance receives and reviews invoice
- Matches to purchase order and receipt
- Processes payment per vendor terms
- Updates financial records
New Vendor Evaluation¶
For vendors not on approved list:
9. Initial Assessment¶
- Business need justification
- Vendor background research
- Financial stability check
- Customer references requested
10. Security Assessment¶
- Security questionnaire completed
- Review security certifications (SOC2, ISO 27001)
- Assess data handling practices
- Evaluate access controls and encryption
- Review incident response capabilities
11. Compliance Review¶
- HIPAA compliance verification (if handling PHI)
- Data processing agreement review
- Privacy policy assessment
- Regulatory compliance confirmation
- Data residency requirements
12. Legal Review¶
- Contract terms evaluation
- Service level agreements
- Liability and indemnification
- Termination and data return provisions
- Insurance requirements
13. Financial Assessment¶
- Pricing structure review
- Payment terms negotiation
- Total cost of ownership analysis
- Budget impact assessment
14. Technical Evaluation¶
- Integration requirements and capabilities
- API availability and documentation
- Support and maintenance terms
- Scalability assessment
- Disaster recovery capabilities
15. Approval Decision¶
- CTO reviews complete assessment
- Approve, request modifications, or reject
- Add to approved vendor list if approved
- Document decision and rationale
Hardware Procurement¶
Specific procedures for hardware:
16. Needs Assessment¶
- Define requirements (performance, portability, specific features)
- Identify standard configuration match
- Request custom configuration approval if needed
17. Standard Configurations¶
- Standard Laptop: 16GB RAM, 512GB SSD, 3-year warranty
- Power User Laptop: 32GB RAM, 1TB SSD, dedicated graphics, 3-year warranty
- Desktop: 16GB RAM, 512GB SSD, dual monitors, 3-year warranty
- Mobile Device: iPhone (current or previous generation) or approved Android
18. Procurement¶
- Order from preferred vendor (Dell, Lenovo, Apple)
- Include asset tagging service if available
- Schedule delivery
19. Receipt and Setup¶
- Inspect for damage
- Apply asset tag
- Image with standard configuration
- Install security software
- Configure encryption
- Test all functionality
20. Deployment¶
- Assign to user in asset management system
- Deliver with setup documentation
- User signs asset acknowledgment form
- Provide user training as needed
Software and SaaS Procurement¶
Specific procedures for software:
21. Needs Assessment¶
- Define business requirements
- Identify number of licenses needed
- Determine if existing tool can meet needs
- Research alternatives
22. Free Trial/Proof of Concept¶
- Request trial or POC from vendor
- Test with representative users
- Evaluate against requirements
- Assess user adoption and training needs
23. Security and Compliance Review¶
- Complete security questionnaire
- Review data processing agreement
- Assess integration requirements
- Verify SSO compatibility
- Check compliance certifications
24. License Type Selection¶
- Choose appropriate license type (user-based, device-based, concurrent)
- Determine if subscription or perpetual
- Assess volume licensing options
- Calculate total cost of ownership
25. Procurement and Setup¶
- Purchase licenses
- Configure SSO integration
- Set up user provisioning
- Configure security settings
- Document configuration
26. User Onboarding¶
- Provision licenses to users
- Provide training materials
- Offer training sessions if needed
- Establish support process
27. License Management¶
- Track licenses in asset management system
- Monitor usage and compliance
- Review quarterly for optimization
- Renew or adjust licenses as needed
Renewal Management¶
For recurring licenses and subscriptions:
28. Tracking¶
- All renewals tracked in asset management system
-
Automated reminders 90, 60, 30 days before expiration
-
Review (60 days before expiration):
- Assess continued business need
- Review usage and adoption
- Evaluate cost vs. value
- Consider alternative solutions
-
Determine license quantity needed
-
Negotiation (if applicable):
- Request renewal quote from vendor
- Negotiate pricing and terms
- Seek volume discounts
- Explore multi-year commitments for savings
29. Approval¶
- Follow standard approval process
- Budget verification
- Obtain required approvals
30. Renewal¶
- Submit renewal order
- Verify continuation of service
- Update asset management system
- Process payment
31. Non-Renewal¶
- Notify vendor of non-renewal
- Migrate data if needed
- Decommission and remove access
- Cancel payment authorization
- Update asset records
Exceptions¶
Exceptions to procurement policy may be granted for:
- Emergency Situations: Critical business need requiring immediate purchase
- Single Source: Only one vendor can provide required solution
- Strategic Initiatives: Executive-approved strategic projects
- Grant-Funded: Purchases funded by specific grants with vendor requirements
Exception process: - Document exception justification in purchase request - Obtain CTO approval (or CFO for financial exceptions) - Complete security/compliance review post-purchase if not feasible beforehand - Document exception in procurement records - Report exceptions quarterly to executive leadership
Compliance and Enforcement¶
- Procurement Tracking: All purchases logged in procurement system
- Approval Workflow: System-enforced approval workflows prevent unauthorized purchases
- Monthly Reporting: Monthly procurement report to Finance and IT leadership
- Quarterly Reviews: Review procurement compliance and vendor performance
- Annual Audit: Comprehensive audit of procurement practices
- Key Metrics:
- Procurement policy compliance rate (target: 100%)
- Average procurement cycle time
- Cost savings from preferred vendors
- Vendor performance scores
- Budget variance
- Violations: Non-compliant purchases result in:
- Purchase rejection or return
- Mandatory training on procurement process
- Manager notification for employee purchases
- Potential disciplinary action for repeated violations
- Personal financial responsibility for unauthorized purchases
References¶
- ISO/IEC 27001: Information Security Management - Supplier Relationships
- NIST SP 800-53: Supply Chain Risk Management
- SOC 2 Trust Service Criteria: Vendor Management
- HIPAA Business Associate Requirements
- Company Financial Policies and Procedures
Revision History¶
| Version | Date | Author | Changes |
|---|---|---|---|
| 1.0 | 2025-11-08 | IT Team / Procurement Team | Initial version migrated from Notion |
Document Control - Classification: Internal - Distribution: All employees, IT team, procurement team, finance team - Storage: GitHub repository - policy-repository