Home
Requesting Security Access
Security Access Policies
Request for Security Access Forms
Security Officers |
|
To Request Security Access to Student Systems
Before Obtaining Access
There are several security policies which each user must be familiar with and abide by when working in any of the student systems. These policies are found at GoWMU>Faculty/Staff tab>My Work channel>Student Systems Security Access Centeror click the link to the left.
You need to know who your security officer is. To find out, use the list found at GoWMU>Faculty/Staff tab>My Work channel>Student Systems Security Access Center or click the link to the left.
Obtaining Access
To obtain access to one of the student information management systems, do the following.
- Familiarize yourself with the security policies found at the link above or on the left.
- Find the appropriate form from GoWMU>Faculty/Staff tab>My Work channel>Student Systems Security Access Center (or click the link on the left).
- Complete the form, print the form, sign the form, and obtain the appropriate signatures as indicated on the form.
- Forward all forms, except Request for SSN Access*, to your security officer (location above).
- The security officer will authorize the security access and notify the appropriate personnel in the Office of Information Technology (OIT) to create the account.
- OIT will create the account and notify the security officer that it is complete.
- The security officer communicates to the user that the account has been created, along with any other information the user needs to know.
- The completed access request form is scanned into Image Now. The original is destroyed after 30 days.
*Send the Request for SSN Access to the appropriate Vice President for signature. After the VP has signed the form, forward it to your security officer (see list found at above location). The security officer will sign the form and forward it to the Registrar’s office for processing.
Security Access Protocol
The Security Access Protocol document delineates the criteria for locking security access accounts as well as the revocation of access accounts. Please review.
|