Home

Requesting Security Access

Security Access Policies

Request for Security Access Forms

Security Officers
    

To Request Security Access to Student Systems

Before Obtaining Access

There are several security policies which each user must be familiar with and abide by when working in any of the student systems. These policies are found at GoWMU>Faculty/Staff tab>My Work channel>Student Systems Security Access Centeror click the link to the left.

You need to know who your security officer is. To find out, use the list found at GoWMU>Faculty/Staff tab>My Work channel>Student Systems Security Access Center or click the link to the left.

Obtaining Access

To obtain access to one of the student information management systems, do the following.

  1. Familiarize yourself with the security policies found at the link above or on the left.
  2. Find the appropriate form from GoWMU>Faculty/Staff tab>My Work channel>Student Systems Security Access Center (or click the link on the left).
  3. Complete the form, print the form, sign the form, and obtain the appropriate signatures as indicated on the form.
  4. Forward all forms, except Request for SSN Access*, to your security officer (location above).
  5. The security officer will authorize the security access and notify the appropriate personnel in the Office of Information Technology (OIT) to create the account.
  6. OIT will create the account and notify the security officer that it is complete.
  7. The security officer communicates to the user that the account has been created, along with any other information the user needs to know.
  8. The completed access request form is scanned into Image Now. The original is destroyed after 30 days.

*Send the Request for SSN Access to the appropriate Vice President for signature. After the VP has signed the form, forward it to your security officer (see list found at above location). The security officer will sign the form and forward it to the Registrar’s office for processing.

Security Access Protocol

The Security Access Protocol document delineates the criteria for locking security access accounts as well as the revocation of access accounts. Please review.