IDMS Access Form

Guidelines for completion and submission
This form is required for access to all University of Miami systems and applications.  You must submit one form per system or application for which access is requested.  Please print the guidelines for completion and submission for reference before displaying and completing the form.

After the IT Application Security & Control office receives your completed application, you will be sent a completion notice via email or inter-office mail.  Contact IT Application Security & Control, (305) 284-5992 for help completing the form, or if you have questions concerning the status of your access request.
Vendor VPN Access Form Use this form to request access for non-UM entities who need to use systems or network services within the UM Intranet.

top

Guidelines For Completion And Submission of IDMS Access Form

  1.

    Complete sections labeled “Authorized User Agreement” and “Requestor Information”.  Boxes indicate required information.  Enter the information requested in each box, and use the drop-down list to select the PIDMS application for which you are requesting access.  Notice that the Data Custodian corresponding to the system or application chosen will automatically be selected.
  2.

    Print the form by clicking on the “Print” button on the bottom right-hand corner.
  3.

    Obtain authorization from your Department Administrator.  She/He must sign the form after providing the appropriate budgetary account to which computer services are charged.
  4.

    Obtain authorization from the appropriate Data Custodian.  She/He must sign the form after indicating what access profile is appropriate for your use.
  5.

    Forward or fax the completed form to IT Application Security & Control:

IT Application Security & Control

Plumer Bldg. #41

Locator 2444
FAX:  (305) 284-3935

top

Internal Publications


IT Security Orientation For Students (Brochure—PDF) Summary of important University policies that apply to ALL students who use University computer & networking resources.  Tips and guidelines for safe computing.

top