Internal Forms






IDMS Access Form


Guidelines for completion and submission

This form is required for access to all University of Miami systems and applications.  You must submit one form per system or application for which access is requested.  Please print the guidelines for completion and submission for reference before displaying and completing the form.

After the IT User Account Management office receives your completed application, you will be sent a completion notice via email.  Contact  IT User Account Management, (305) 284-5992 for help completing the form, or if you have questions concerning the status of your access request.

Vendor VPN Access Form Use this form to request access for non-UM entities who need to use systems or network services within the UM Intranet. 




Guidelines For Completion And Submission of IDMS Access Form

  1. Complete sections labeled "Authorized User Agreement" and "Requestor Information".  Boxes indicate required information.  Enter the information requested in each box, and use the drop-down list to select the PIDMS application for which you are requesting access.  Notice that the Data Custodian corresponding to the system or application chosen will automatically be selected.


  3. Print the form by clicking on the "Print" button on the bottom right-hand corner. 


  5. Obtain authorization from your Department Administrator.  She/He must sign the form after providing the appropriate budgetary account to which computer services are charged.


  7. Obtain authorization from the appropriate Data Custodian.  She/He must sign the form after indicating what access profile is appropriate for your use.


  9. Forward or fax the completed form to IT Application Security & Control:


IT Application Security & Control


Plumer Bldg. #41

Locator 2444

FAX:  (305) 284-3935



Internal Publications




IT Security Orientation For Students (Brochure—PDF) Summary of important University policies that apply to ALL students who use University computer & networking resources.  Tips and guidelines for safe computing.