The document outlines the security access request workflow for faculty and staff. It involves the employee submitting a request form to their department chair/director. The manager then approves or denies the request, and if approved, electronically signs and emails it to the relevant business owner. The business owner provides final approval by signing and submitting a ticket and form to Computing Information Services, who assign the request to a liaison to fulfill the access roles.
The document outlines the security access request workflow for faculty and staff. It involves the employee submitting a request form to their department chair/director. The manager then approves or denies the request, and if approved, electronically signs and emails it to the relevant business owner. The business owner provides final approval by signing and submitting a ticket and form to Computing Information Services, who assign the request to a liaison to fulfill the access roles.
The document outlines the security access request workflow for faculty and staff. It involves the employee submitting a request form to their department chair/director. The manager then approves or denies the request, and if approved, electronically signs and emails it to the relevant business owner. The business owner provides final approval by signing and submitting a ticket and form to Computing Information Services, who assign the request to a liaison to fulfill the access roles.
Manager must approve or deny the employees request
and when necessary, revise the request. If approved, Manager will electronically sign and then email the request to the Business Owner. If there are more than 1 business owners, email to the first owner and request that they forward it to the next business owner.
Business Owner(Registrar, Admissions, Bursar
and/or Financial Aid)
Business Owner of specific data must provide approval
by electronically signing the form. Business owner submits a CIS Grouplink ticket and Request Form with all appropriate signatures.
Computing Information Services
A ticket will be assigned to the Application Security
Liaisons. Once the roles have been assigned, an automatic email will be sent to the requesting departmental business owner, manager and the user themselves.
Summary of The Subtle Art of Not Giving A F*ck: A Counterintuitive Approach to Living a Good Life by Mark Manson: Key Takeaways, Summary & Analysis Included
ChatGPT Side Hustles 2024 - Unlock the Digital Goldmine and Get AI Working for You Fast with More Than 85 Side Hustle Ideas to Boost Passive Income, Create New Cash Flow, and Get Ahead of the Curve