How to Request
Click the Request Access button.
Service Description
Grant access upon confirmation of business need and data authorization.
Standard Features
- Evaluation of request based on business need
- Coordination of necessary approvals.
Roles and Responsibilities
User Responsibilities
- Provide details related to access needed and sufficient justification describing job duties requiring access to sensitive or controlled data.
- Define access requirements, such as the need to query or modify data.
Service Provider Responsibilities
- Coordination with data custodian(s) to obtain authorization, based on justification provided,
- Modification of data security access as approved,
- Assist with the request and communicate with requestor, as needed.
Service Audience
All ISU faculty, staff, and students requiring access to non-Banner applications to perform their job duties.
Key Words: Aleks, Argos, Appworx, Axiom, Bengalweb, Cornerstone, CS Gold, Chrome River, Collegenet, Cuts, Degree Works, EMS, ePrint, etranscript, ISSM, Michael Sutter, Portfolio Project Management, Rave, Recruiter, Runner Technology, Simplek, Starrez, T2, or Touchnet.