Policies & Compliance

Collaboratory is committed to transparency and accessibility. We work hard to ensure you have the information you need, when you need it.

Accessibility

Collaboratory is considered ADA compliant and has successfully adopted WCAG 2.0, level A and AA. View our VPAT here.

A Voluntary Product Accessibility Template (VPAT) evaluates the accessibility of web products according to each criteria of Section 508 of the United States Rehabilitation Act.  Section 508 details standards for the safety and accessibility of websites for individuals with disabilities.  It is a document created by a third party reviewer to assist purchasers and users of web-based products understand the level of accessibility and compliance with Section 508, compare compliance among similar products, and identify the accessibility standards met by the product.

Information Security & Data Protection


Collaboratory has completed a HECVAT-Lite assessment which is available upon request. The Higher Education Cloud Vendor Assessment Tool – Lite (HECVAT – Lite) attempts to generalize higher education information security and data protection questions and issues for consistency and ease of use.  It is intended to provide a starting point for the assessment of third-party provided cloud services and resources.  Some institutions may have specific issues that must be addressed in addition to the general questions provided in this assessment. The HECVAT was created by the Higher Education Information Security Council Shared Assessments Working Group. 

Learn more at https://www.educause.edu/hecvat or https://www.ren-isac.net/hecvat.

Single Sign On via InCommon


Collaboratory is a service provider with The InCommon Federation’s Research & Scholarship Category, which provides member institutions with the benefits and ease of Federated Identity Management access via Single Sign On. InCommon eliminates the need for researchers, students, and educators to maintain multiple, password-protected accounts. The InCommon Federation supports user access to protected resources by allowing institutions to make access decisions to resources based on a user’s status and privileges as presented by the user’s home institution.