FAQ

Click questions to expand answers.

ISPO Services

The ISPO utilizes self-service intake services using University’s enterprise ticketing system Help.UNM, and phone and in-person intake services from the UNM IT Service Desk, the University's central support organization for IT-related services and computer-related issues. All information security or privacy related events and incidents, and service requests are forwarded to ISPO by Service Desk staff.
  • Privacy, Compliance, and Risk Services
    • Contract Review
    • Data Sharing Agreement Review
    • Institutional Review Board (IRB) Review
    • PCI Compliance
    • Other Privacy, Compliance, and Risk Services
  • Information Security Services
    • Continuous Vulnerability Monitoring
      • Application Access Requests
      • Application Maintenance and Support Requests
    • Event Management
    • Digital Forensics
    • Firewall Change Requests
    • Incident Response Services
      • Information Security Incident Response Services
        • Minor Incidents
        • Major Incident
    • Information Request
    • Operational Intelligence
      • Event Management
      • Event Log Analysis
    • Penetration Testing
      • Network Vulnerability Penetration Test
      • Web Applications Penetration Test
    • Vulnerability Assessment(s)
      • Network Vulnerability Assessment
      • Web Applications Assessments
    • Other Information Security Request
The ISPO utilizes the University’s enterprise service management system Help.UNM and intake services provided by the UNM Information Technologies (UNM IT) Customer Service Desk, the University's central support organization for information technology-related services and computer-related issues.  All information security-related events, incidents, and requests are forwarded to the ISPO by UNM IT Customer Service Desk agents and coordinators.

Please use Help.UNM or call the IT Customer Service Desk at 7-5757 to ensure that your request is opened, tracked, and processed in a timely manner.  Requests submitted via email or channels not monitored by the IT Service Desk staff cannot be processed.

Cybersecurity Request Types

Who can submit a request?

This request type is available to all University account users (i.e. NetID users), however, written authorization from a cognizant University official is required (see below).

What information is required to submit a request?

Requestors shall provide a clear and concise overview in the description of their request, a thoroughly completed Account Access Reinstatement Form, and a signed authorization memo from a cognizant University official (e.g. Dean of Students). The required form and memo shall be attached to the request record at the time of submission.

Requests that are overly broad or that lack specificity, or that do not include an Account Access Reinstatement Form, or a signed authorization memo cannot be processed.

What is the cost of this request?

This request type is provided to all University account users at no-cost.

Requests that deviate from the standard offering are evaluated on a case-by-case basis and may result in a fee in scenarios where additional resources including, but not limited to, hardware, software, staff time, or other materials are required to support such requests.

Where can I submit this request?

This request type shall be submitted in Help.UNM Self-Service to ensure that each request is opened, tracked, and processed in a timely manner.

Requests submitted outside of the Help.UNM Self-Service portal (e.g. Cherwell Service Management client application, RightNow’s ‘Ask a Question’ feature, or the QuickIT portal) cannot be processed.

When can I submit this request?

Requests may be submitted at any time.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be processed?

Requests that include all minimum-required information at the time of submission, are processed during standard business hours (i.e. 08:00 to 17:00 Mountain Time), Monday through Friday, excluding weekends and holidays.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be fulfilled?

This request type is typically fulfilled within a three (3) business day period, with most being fulfilled within the five (5) business day period specified in the Service-Level Agreement for this request type.

Requests are prioritized and fulfilled based on resource availability including hardware, software, staff, and cannot be expedited.

How can I submit this request?

Requests shall be submitted in Help.UNM Self-Service.

Navigate to Help.UNM > Make a Request > Information Security and Privacy Services > Information Security Services > Category: Account Access Reinstatement Request > Describe > Submit.

Who can submit a request?

University staff selecting this request type shall have an appropriate University-defined cybersecurity or information technology-focused job description (i.e. position classification). For more information about UNM's Job Descriptions, please reference the UNM Human Resources Position Classification Description Listing website for more information.

Cybersecurity Roles
Information Security Officers
  • University Information Security & Privacy Officer (Info Security Ofcr)
  • Information Security Officer (Info Security Ofcr)
Cybersecurity Engineers
  • Cybersecurity Engineer I-III (Cybersecurity Engineer 1-3)
IT Roles
IT Directors and Associate IT Directors
  • Director of Core Information Technology Services (Dir,Core IT Svcs)
  • Director of Information Technology Service (Dir,IT Svcs)
  • Associate Director of Core Information Technology Services (Assoc Dir,Core IT Svcs)
  • Associate Director of Information Technology Services (Assoc Dir,IT Svcs)
IT Managers
  • Manager of Core Information Technology Services (Mgr,Core IT Svcs)
  • Manager of Information Technology Services (Mgr,IT Svcs)
IT Officers
  • IT Officer (IT Officer)
IT Project Managers
  • IT Project Manager I-III (IT Project Mgr 1-3)
IT Specialists, IT Analysts, and IT Technicians
  • Senior Core Information Technology Services Specialist (Sr Core IT Svcs Splst)
  • Core Information Technology Services Specialist (Core IT Svcs Splst)
  • Programmer Analyst I-III (Programmer Analyst 1-3)
  • Systems/Network Analyst I-III (Systems/Network Analyst 1-3)
  • Technical Analyst I-III (Technical Analyst 1-3)
  • Information Technology Support Technician I-III (IT Support Tech 1-3)

Requests submitted by UNM staff who do not have an appropriate job description cannot be processed.

NOTE: Faculty and administrative staff in need of assistance with this request type are encouraged to contact their area's designated IT Officer or Liaison.

What information is required to submit a request?

Requestors shall provide a clear and concise overview of their requirements in the description of their request and a thoroughly completed Business Continuity Access Request Form which shall be attached to the request record at the time of submission.

Requests that are overly broad or that lack specificity, or that do not include a Business Continuity Access Request Form cannot be processed.

What is the cost of this request?

This request type is provided to all IT support units at no-cost.

Requests that deviate from the standard offering are evaluated on a case-by-case basis and may result in a fee in scenarios where additional resources including, but not limited to, hardware, software, staff time, or other materials are required to support such requests.

Where can I submit this request?

This request type shall be submitted in Help.UNM Self-Service to ensure that each request is opened, tracked, and processed in a timely manner.

Requests submitted outside of the Help.UNM Self-Service portal (e.g. Cherwell Service Management client application, RightNow's 'Ask a Question' feature, or the QuickIT portal) cannot be processed.

When can I submit this request?

Requests may be submitted at any time.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be processed?

Requests that include all minimum-required information at the time of submission, are processed during standard business hours (i.e. 08:00 to 17:00 Mountain Time), Monday through Friday, excluding weekends and holidays.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be fulfilled?

This request type is typically fulfilled within a three (3) business day period, with most being fulfilled within the five (5) business day period specified in the Service-Level Agreement for this request type.

Requests are prioritized and fulfilled based on resource availability including hardware, software, staff, and cannot be expedited.

How can I submit this request?

Requests shall be submitted in Help.UNM Self-Service.

Navigate to Help.UNM > Make a Request > Information Security and Privacy Services > Information Security Services > Category: Business Continuity Access Request > Describe > Submit.

Who can submit a request?

This request type cannot be directly requested.

A system process will generate request records classified as the Cloud Vendor Assessment Request type when triggered by a workflow item contained in Banner Workflow.

What information is required to submit a request?

This request type cannot be directly requested.

Banner Workflow item submitters shall provide a clear and concise description of their request in the upstream Banner Workflow application, a vendor-completed Higher Education Community Vendor Assessment Toolkit (HECVAT), and any supplemental documentation referenced within the vendor-completed HECVAT.

System-generated requests that are overly broad, that lack specificity, or that do not contain a vendor-completed HECVAT cannot be processed.

What is the cost of this request?

This request type cannot be directly requested.

This request type is provided to the ISPO's Privacy, Compliance, and Risk area at no-cost.

Requests that deviate from the standard offering are evaluated on a case-by-case basis and may result in a fee in scenarios where additional resources including, but not limited to, hardware, software, staff time, or other materials are required to support such requests.

Where can I submit this request?

This request type cannot be directly requested.

A system process will generate request records classified as the Cloud Vendor Assessment Request type when triggered by a workflow item contained in Banner Workflow.

When can I submit this request?

This request type cannot be directly requested.

A system process will generate request records classified as the Cloud Vendor Assessment Request type when triggered by a workflow item contained in Banner Workflow.

Requests that are generated after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be processed?

This request type cannot be directly requested.

Requests that include all minimum-required information at the time of generation by system process, are processed during standard business hours (i.e. 08:00 to 17:00 Mountain Time), Monday through Friday, excluding weekends and holidays.

Requests that are generated after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be fulfilled?

This request type cannot be directly requested.

This request type is typically fulfilled within a ten (10) business day period starting the first full business day after generation by system process, with most being fulfilled within the fifteen (15) business day period specified in the Service-Level Agreement for this request type.

Work product created to fulfill in-scope requests is provided directly to the ISPO's Privacy, Compliance, and Risk area using Banner Workflow.

Requests are prioritized and fulfilled based on resource availability including, but not limited to, hardware, software, staff, and cannot be expedited.

How can I submit this request?

This request type cannot be directly requested.

Who can submit a request?

University staff selecting this request type shall have an appropriate University-defined cybersecurity or information technology-focused job description (i.e. position classification). For more information about UNM's Job Descriptions, please reference the UNM Human Resources Position Classification Description Listing website for more information.

Eligibility to request access to ISPO-managed cybersecurity applications is determined by the requestor’s assigned role and assigned department (or area).

CIO Roles
  • Chief Information Officer (Chief Information Officer)
  • Deputy Chief Information Officer (Deputy CIO)
Cybersecurity Roles
Information Security Officers
  • University Information Security & Privacy Officer (Info Security Ofcr)
  • Information Security Officer (Info Security Ofcr)
Cybersecurity Engineers
  • Cybersecurity Engineer I-III (Cybersecurity Engineer 1-3)
IT Roles
IT Directors and Associate IT Directors
  • Director of Core Information Technology Services (Dir,Core IT Svcs)
  • Director of Information Technology Service (Dir,IT Svcs)
  • Associate Director of Core Information Technology Services (Assoc Dir,Core IT Svcs)
  • Associate Director of Information Technology Services (Assoc Dir,IT Svcs)
IT Managers
  • Manager of Core Information Technology Services (Mgr,Core IT Svcs)
  • Manager of Information Technology Services (Mgr,IT Svcs)
IT Officers
  • IT Officer (IT Officer)
IT Specialists, IT Analysts, and IT Technicians
  • Senior Core Information Technology Services Specialist (Sr Core IT Svcs Splst)
  • Core Information Technology Services Specialist (Core IT Svcs Splst)
  • Programmer Analyst I-III (Programmer Analyst 1-3)
  • Systems/Network Analyst I-III (Systems/Network Analyst 1-3)
  • Technical Analyst I-III (Technical Analyst 1-3)
  • Information Technology Support Technician I-III (IT Support Tech 1-3)

Requests submitted by UNM staff who do not have an appropriate job description cannot be processed.

Department
  • Center for Academic Program Support (CAPS IT)
  • Center for Advanced Research Computing (CARC IT)
  • Center for High Technology Materials (CHTM IT)
  • College of University Libraries & Learning Sciences (CULLS IT)
  • Earth Data Analysis Center (EDAC IT)
  • Information Security & Privacy Office (ISPO)
    • Cybersecurity Engineering & Operations
    • Information Security Program Management
  • IT Academic Technologies (IT AT)
    • Learning Environments
    • Learning Management Systems, Scoring, Surveys, and Evaluations
    • Media & Collaborative Applications
  • IT Applications (IT APPS)
    • Data and Reporting
    • Development
    • Operations
    • Support
  • IT Campus Outreach & Engagement (IT COE)
    • Anderson School of Management (ASM IT)
    • Athletics (Athletics IT)
    • Branch Campuses
      • Gallup
      • Los Alamos
      • Taos
      • Valencia
    • Business Center (BC IT)
    • Division of Enrollment Management (EM IT)
      • Global Education Office (GEO)
      • Student Affairs (SA)
      • Student Health and Counseling (SHAC)
    • College of Arts & Sciences (A&S IT)
    • College of Education and Human Sciences (CoEHS IT)
    • College of Fine Arts (CFA IT)
    • Institutional Support Services (ISS - IT)
      • Auxiliaries (ISS - Auxiliaries)
      • Facilities (ISS - Facilities)
    • School of Engineering (SoE IT)
    • School of Law (SoL IT)
  • IT Computing Platforms (IT Platforms)
    • Database Administration (DBA)
    • Distributed Systems (DSYS)
    • Enterprise Managed Systems & Services (EMSS)
      • Desktop and Printer Support
        • Managed Workstations
        • Student Field Agent Program
      • Systems
    • Virtual Infrastructure & Storage (VIS)
  • IT Customer Support Services (IT CSS)
    • Customer Service Desk (CSD)
    • Service Management (SM)
  • IT Networks (IT Networks)
    • Data Networks
      • LAN
      • WAN
      • Wireless
    • Fire & Security Services
    • Voice
      • Advanced Voice Applications
  • KNME-TV, New Mexico PBS (KNME IT)
  • KUNM (KUNM IT)
  • NM Established Program to Stimulate Competitive Research (EPSCoR IT)
  • Office of the Chief Information Officer (Office of the CIO)
  • Office of the Vice President for Research (OVPR IT)
  • Police Department (PD IT)
  • School of Architecture & Planning (SAAP IT)
  • Utility Services (US IT)

Requests submitted by UNM staff who are not directly assigned to a department or area listed above cannot be processed.

What information is required to submit a request?

Requestors shall provide a clear and concise overview of their requirements in the description of their request.

Cybersecurity Application Access Requests must be approved by the requestor’s direct supervisor.

Requests that are overly broad or that lack specificity, or that do not receive the appropriate approvals cannot be processed.

What approvals are required?

Approvals will be generated in Help.UNM on behalf of the requestor. Please have the approver respond to email from Help.UNM (help@unm.edu).

Eligibility for access to ISPO-managed cybersecurity applications is determined by the requestor’s assigned role and assigned department (or area).

Requests that do not receive the appropriate approvals cannot be processed.

What is the cost of this request?

Basic application access is provided to all IT support units at no-cost.

Requests that deviate from the standard offering are evaluated on a case-by-case basis and may result in a fee in scenarios where additional resources including, but not limited to, hardware, software, staff time, or other materials are required to support such requests.

Where can I submit this request?

All requests submitted to the University's Information Security & Privacy Office (ISPO) shall be submitted by University-defined Information Technology staff in Help.UNM Self-Service to ensure that each request is opened, tracked, and processed in a timely manner.

Requests submitted outside of the Help.UNM Self-Service portal (e.g. Cherwell Service Management client application, RightNow's 'Ask a Question' feature, or the QuickIT portal) cannot be processed.

When can I submit this request?

Requests may be submitted at any time.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be processed?

Requests that include all minimum-required information at the time of submission, are processed during standard business hours (i.e. 08:00 to 17:00 Mountain Time), Monday through Friday, excluding weekends and holidays.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be fulfilled?

This request type is typically fulfilled within a three (3) business day period, with most being fulfilled within the five (5) business day period specified in the Service-Level Agreement for this request type.

Requests are prioritized and fulfilled based on resource availability including hardware, software, staff, and cannot be expedited.

How can I submit this request?

Requests shall be submitted in Help.UNM Self-Service.

Eligibility to request access to ISPO-managed cybersecurity applications is determined by the requestor’s assigned role and assigned department (or area).

Navigate to Help.UNM > Make a Request > Information Security and Privacy Services > Information Security Services > Category: Application Access Request > Describe > Submit.

Who can submit a request?

This request type cannot be directly requested.

Cybersecurity Engineering and Operations staff will generate this request on an as-needed basis to track maintenance-related activities.

What information is required to submit a request?

This request type cannot be directly requested.

Requests that are overly broad or that lack specificity, or that do not receive the appropriate approvals cannot be processed.

What approvals are required?

Approvals may be required on a case-by-case basis. In the event an approval is required, one will be generated in Help.UNM on behalf of the requestor. In such an event, please have the approver respond to email from Help.UNM (help@unm.edu).

Eligibility to request maintenance of ISPO-managed cybersecurity applications is determined by the requestor’s assigned role and assigned department (or area).

Requests that do not receive the appropriate approvals cannot be processed.

What is the cost of this request?

This request type cannot be directly requested.

Requests that deviate from the standard offering are evaluated on a case-by-case basis and may result in a fee in scenarios where additional resources including, but not limited to, hardware, software, staff time, or other materials are required to support such requests.

Where can I submit this request?

This request type cannot be directly requested.

Cybersecurity Engineering and Operations staff will generate this request on an as-needed basis to track maintenance-related activities.

When can I submit this request?

This request type cannot be directly requested.

Cybersecurity Engineering and Operations staff will generate this request on an as-needed basis to track maintenance-related activities.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be processed?

This request type cannot be directly requested.

Requests that include all minimum-required information at the time of submission are processed during standard business hours (i.e. 08:00 to 17:00 Mountain Time), Monday through Friday, excluding weekends and holidays.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be fulfilled?

This request type cannot be directly requested.

This request type is typically fulfilled within a three (3) business day period, with most being fulfilled within the seven (7) business day period specified in the Service-Level Agreement for this request type.

Requests are prioritized and fulfilled based on resource availability including, but not limited to, hardware, software, staff, and cannot be expedited.

How can I submit this request?

This request type cannot be directly requested.

Who can submit a request?

University staff selecting this request type shall have an appropriate University-defined cybersecurity or information technology-focused job description (i.e. position classification). For more information about UNM's Job Descriptions, please reference the UNM Human Resources Position Classification Description Listing website for more information.

Eligibility to request access to ISPO-managed cybersecurity applications is determined by the requestor’s assigned role and assigned department (or area).

CIO Roles
  • Chief Information Officer (Chief Information Officer)
  • Deputy Chief Information Officer (Deputy CIO)
Cybersecurity Roles
Information Security Officers
  • University Information Security & Privacy Officer (Info Security Ofcr)
  • Information Security Officer (Info Security Ofcr)
Cybersecurity Engineers
  • Cybersecurity Engineer I-III (Cybersecurity Engineer 1-3)
IT Roles
IT Directors and Associate IT Directors
  • Director of Core Information Technology Services (Dir,Core IT Svcs)
  • Director of Information Technology Service (Dir,IT Svcs)
  • Associate Director of Core Information Technology Services (Assoc Dir,Core IT Svcs)
  • Associate Director of Information Technology Services (Assoc Dir,IT Svcs)
IT Managers
  • Manager of Core Information Technology Services (Mgr,Core IT Svcs)
  • Manager of Information Technology Services (Mgr,IT Svcs)
IT Officers
  • IT Officer (IT Officer)
IT Specialists, IT Analysts, and IT Technicians
  • Senior Core Information Technology Services Specialist (Sr Core IT Svcs Splst)
  • Core Information Technology Services Specialist (Core IT Svcs Splst)
  • Programmer Analyst I-III (Programmer Analyst 1-3)
  • Systems/Network Analyst I-III (Systems/Network Analyst 1-3)
  • Technical Analyst I-III (Technical Analyst 1-3)
  • Information Technology Support Technician I-III (IT Support Tech 1-3)

Requests submitted by UNM staff who do not have an appropriate job description cannot be processed.

Department
  • Center for Academic Program Support (CAPS IT)
  • Center for Advanced Research Computing (CARC IT)
  • Center for High Technology Materials (CHTM IT)
  • College of University Libraries & Learning Sciences (CULLS IT)
  • Earth Data Analysis Center (EDAC IT)
  • Information Security & Privacy Office (ISPO)
    • Cybersecurity Engineering & Operations
    • Information Security Program Management
  • IT Academic Technologies (IT AT)
    • Learning Environments
    • Learning Management Systems, Scoring, Surveys, and Evaluations
    • Media & Collaborative Applications
  • IT Applications (IT APPS)
    • Data and Reporting
    • Development
    • Operations
    • Support
  • IT Campus Outreach & Engagement (IT COE)
    • Anderson School of Management (ASM IT)
    • Athletics (Athletics IT)
    • Branch Campuses
      • Gallup
      • Los Alamos
      • Taos
      • Valencia
    • Business Center (BC IT)
    • Division of Enrollment Management (EM IT)
      • Global Education Office (GEO)
      • Student Affairs (SA)
      • Student Health and Counseling (SHAC)
    • College of Arts & Sciences (A&S IT)
    • College of Education and Human Sciences (CoEHS IT)
    • College of Fine Arts (CFA IT)
    • Institutional Support Services (ISS - IT)
      • Auxiliaries (ISS - Auxiliaries)
      • Facilities (ISS - Facilities)
    • School of Engineering (SoE IT)
    • School of Law (SoL IT)
  • IT Computing Platforms (IT Platforms)
    • Database Administration (DBA)
    • Distributed Systems (DSYS)
    • Enterprise Managed Systems & Services (EMSS)
      • Desktop and Printer Support
        • Managed Workstations
        • Student Field Agent Program
      • Systems
    • Virtual Infrastructure & Storage (VIS)
  • IT Customer Support Services (IT CSS)
    • Customer Service Desk (CSD)
    • Service Management (SM)
  • IT Networks (IT Networks)
    • Data Networks
      • LAN
      • WAN
      • Wireless
    • Fire & Security Services
    • Voice
      • Advanced Voice Applications
  • KNME-TV, New Mexico PBS (KNME IT)
  • KUNM (KUNM IT)
  • NM Established Program to Stimulate Competitive Research (EPSCoR IT)
  • Office of the Chief Information Officer (Office of the CIO)
  • Office of the Vice President for Research (OVPR IT)
  • Police Department (PD IT)
  • School of Architecture & Planning (SAAP IT)
  • Utility Services (US IT)

Requests submitted by UNM staff who are not directly assigned to a department or area listed above cannot be processed.

What information is required to submit a request?

Requestors shall provide a clear and concise overview of their requirements in the description of their request.

Requests that are overly broad or that lack specificity cannot be processed.

What approvals are required?

Approvals may be required on a case-by-case basis. In the event an approval is required, one will be generated in Help.UNM on behalf of the requestor. In such an event, please have the approver respond to email from Help.UNM (help@unm.edu).

Eligibility to request support for ISPO-managed cybersecurity applications is determined by the requestor’s assigned role and assigned department (or area).

Requests that do not receive the appropriate approvals cannot be processed.

What is the cost of this request?

Basic application support is provided to all IT support units at no-cost.

Requests that deviate from the standard offering are evaluated on a case-by-case basis and may result in a fee in scenarios where additional resources including, but not limited to, hardware, software, staff time, or other materials are required to support such requests.

Where can I submit this request?

All requests submitted to the University's Information Security & Privacy Office (ISPO) shall be submitted by University-defined Information Technology staff in Help.UNM Self-Service to ensure that each request is opened, tracked, and processed in a timely manner.

Requests submitted outside of the Help.UNM Self-Service portal (e.g. Cherwell Service Management client application, RightNow's 'Ask a Question' feature, or the QuickIT portal) cannot be processed.

When can I submit this request?

Requests may be submitted at any time.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be processed?

Requests that include all minimum-required information at the time of submission, are processed during standard business hours (i.e. 08:00 to 17:00 Mountain Time), Monday through Friday, excluding weekends and holidays.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be fulfilled?

This request type is typically fulfilled within a three (3) business day period, with most being fulfilled within the five (5) business day period specified in the Service-Level Agreement for this request type.

Requests are prioritized and fulfilled based on resource availability including hardware, software, staff, and cannot be expedited.

How can I submit this request?

Requests shall be submitted in Help.UNM Self-Service.

Eligibility to request access to ISPO-managed cybersecurity applications is determined by the requestor’s assigned role and assigned department (or area).

Navigate to Help.UNM > Make a Request > Information Security and Privacy Services > Information Security Services > Category: Application Maintenance or Support Request > Describe > Submit.

Who can submit a request?

University staff selecting this request type shall have an appropriate University-defined cybersecurity or information technology-focused job description (i.e. position classification). For more information about UNM's Job Descriptions, please reference the UNM Human Resources Position Classification Description Listing website for more information.

Cybersecurity Roles
Information Security Officers
  • University Information Security & Privacy Officer (Info Security Ofcr)
  • Information Security Officer (Info Security Ofcr)
Cybersecurity Engineers
  • Cybersecurity Engineer I-III (Cybersecurity Engineer 1-3)
IT Roles
IT Directors and Associate IT Directors
  • Director of Core Information Technology Services (Dir,Core IT Svcs)
  • Director of Information Technology Service (Dir,IT Svcs)
  • Associate Director of Core Information Technology Services (Assoc Dir,Core IT Svcs)
  • Associate Director of Information Technology Services (Assoc Dir,IT Svcs)
IT Managers
  • Manager of Core Information Technology Services (Mgr,Core IT Svcs)
  • Manager of Information Technology Services (Mgr,IT Svcs)
IT Officers
  • IT Officer (IT Officer)
IT Project Managers
  • IT Project Manager I-III (IT Project Mgr 1-3)
IT Specialists, IT Analysts, and IT Technicians
  • Senior Core Information Technology Services Specialist (Sr Core IT Svcs Splst)
  • Core Information Technology Services Specialist (Core IT Svcs Splst)
  • Programmer Analyst I-III (Programmer Analyst 1-3)
  • Systems/Network Analyst I-III (Systems/Network Analyst 1-3)
  • Technical Analyst I-III (Technical Analyst 1-3)
  • Information Technology Support Technician I-III (IT Support Tech 1-3)

Requests submitted by UNM staff who do not have an appropriate job description cannot be processed.

NOTE: Faculty and administrative staff in need of assistance with this request type are encouraged to contact their area's designated IT Officer or Liaison.

What information is required to submit a request?

Requestors shall provide a clear and concise overview of their requirements in the description of the request.

Requests that are overly broad or that lack specificity cannot be processed.

What is the cost of this request?

This request type is provided to all IT support units at no-cost.

Requests that deviate from the standard offering are evaluated on a case-by-case basis and may result in a fee in scenarios where additional resources including, but not limited to, hardware, software, staff time, or other materials are required to support such requests.

Where can I submit this request?

All requests submitted to the University's Information Security & Privacy Office (ISPO) shall be submitted by University-defined Information Technology staff in Help.UNM Self-Service to ensure that each request is opened, tracked, and processed in a timely manner.

Requests submitted outside of the Help.UNM Self-Service portal (e.g. Cherwell Service Management client application, RightNow's 'Ask a Question' feature, or the QuickIT portal) cannot be processed.

When can I submit this request?

Requests may be submitted at any time.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be processed?

Requests that include all minimum-required information at the time of submission, are processed during standard business hours (i.e. 08:00 to 17:00 Mountain Time), Monday through Friday, excluding weekends and holidays.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be fulfilled?

This request type is typically fulfilled within a ten (10) business day period, with most being fulfilled within the fifteen (15) business day period specified in the Service-Level Agreement for this request type.

Requests are prioritized and fulfilled based on resource availability including, but not limited to, hardware, software, staff, and cannot be expedited.

How can I submit this request?

Requests shall be submitted in Help.UNM Self-Service.

Navigate to Help.UNM > Make a Request > Information Security and Privacy Services > Information Security Services > Category: Cybersecurity Consulting Request > Describe > Submit.

Who can submit a request?

University staff selecting this request type shall have an appropriate University-defined cybersecurity or information technology-focused job description (i.e. position classification). For more information about UNM's Job Descriptions, please reference the UNM Human Resources Position Classification Description Listing website for more information.

Cybersecurity Roles
Information Security Officers
  • University Information Security & Privacy Officer (Info Security Ofcr)
  • Information Security Officer (Info Security Ofcr)
Cybersecurity Engineers
  • Cybersecurity Engineer I-III (Cybersecurity Engineer 1-3)
IT Roles
IT Directors and Associate IT Directors
  • Director of Core Information Technology Services (Dir,Core IT Svcs)
  • Director of Information Technology Service (Dir,IT Svcs)
  • Associate Director of Core Information Technology Services (Assoc Dir,Core IT Svcs)
  • Associate Director of Information Technology Services (Assoc Dir,IT Svcs)
IT Managers
  • Manager of Core Information Technology Services (Mgr,Core IT Svcs)
  • Manager of Information Technology Services (Mgr,IT Svcs)
IT Officers
  • IT Officer (IT Officer)
IT Project Managers
  • IT Project Manager I-III (IT Project Mgr 1-3)
IT Specialists, IT Analysts, and IT Technicians
  • Senior Core Information Technology Services Specialist (Sr Core IT Svcs Splst)
  • Core Information Technology Services Specialist (Core IT Svcs Splst)
  • Programmer Analyst I-III (Programmer Analyst 1-3)
  • Systems/Network Analyst I-III (Systems/Network Analyst 1-3)
  • Technical Analyst I-III (Technical Analyst 1-3)
  • Information Technology Support Technician I-III (IT Support Tech 1-3)

Requests submitted by UNM staff who do not have an appropriate job description cannot be processed.

NOTE: Faculty and administrative staff in need of assistance with this request type are encouraged to contact their area's designated IT Officer or Liaison.

What information is required to submit a request?

Requestors shall provide clear and concise feedback in the description of the request.

Requests that are overly broad or that lack specificity cannot be processed.

What is the cost of this request?

This request type is provided to all IT support units at no-cost.

Requests that deviate from the standard offering are evaluated on a case-by-case basis and may result in a fee in scenarios where additional resources including, but not limited to, hardware, software, staff time, or other materials are required to support such requests.

Where can I submit this request?

All requests submitted to the University's Information Security & Privacy Office (ISPO) shall be submitted by University-defined Information Technology staff in Help.UNM Self-Service to ensure that each request is opened, tracked, and processed in a timely manner.

Requests submitted outside of the Help.UNM Self-Service portal (e.g. Cherwell Service Management client application, RightNow's 'Ask a Question' feature, or the QuickIT portal) cannot be processed.

When can I submit this request?

Requests may be submitted at any time.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be processed?

Requests that include all minimum-required information at the time of submission, are processed during standard business hours (i.e. 08:00 to 17:00 Mountain Time), Monday through Friday, excluding weekends and holidays.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be fulfilled?

Feedback requests and the data contained therein are tracked, reviewed, and cataloged.

Constructive feedback is taken into consideration when making periodic updates to the university's cybersecurity program and its corresponding components, cybersecurity standards and guidelines, and the University's enterprise cybersecurity services.

A basic acknowledgment is provided to all requestors, however the ISPO may not be able to directly respond to each individual request.

Requests are prioritized based on resource availability including, but not limited to, hardware, software, and staff, and cannot be expedited.

How can I submit this request?

Requests shall be submitted in Help.UNM Self-Service.

Navigate to Help.UNM > Make a Request > Information Security and Privacy Services > Information Security Services > Category: Business Continuity Access Request > Describe > Submit.

Who can submit a request?

University staff selecting this request type shall have an appropriate University-defined cybersecurity or information technology-focused job description (i.e. position classification). For more information about UNM's Job Descriptions, please reference the UNM Human Resources Position Classification Description Listing website for more information.

Cybersecurity Roles
Information Security Officers
  • University Information Security & Privacy Officer (Info Security Ofcr)
  • Information Security Officer (Info Security Ofcr)
Cybersecurity Engineers
  • Cybersecurity Engineer I-III (Cybersecurity Engineer 1-3)
IT Roles
IT Directors and Associate IT Directors
  • Director of Core Information Technology Services (Dir,Core IT Svcs)
  • Director of Information Technology Service (Dir,IT Svcs)
  • Associate Director of Core Information Technology Services (Assoc Dir,Core IT Svcs)
  • Associate Director of Information Technology Services (Assoc Dir,IT Svcs)
IT Managers
  • Manager of Core Information Technology Services (Mgr,Core IT Svcs)
  • Manager of Information Technology Services (Mgr,IT Svcs)
IT Officers
  • IT Officer (IT Officer)
IT Project Managers
  • IT Project Manager I-III (IT Project Mgr 1-3)
IT Specialists, IT Analysts, and IT Technicians
  • Senior Core Information Technology Services Specialist (Sr Core IT Svcs Splst)
  • Core Information Technology Services Specialist (Core IT Svcs Splst)
  • Programmer Analyst I-III (Programmer Analyst 1-3)
  • Systems/Network Analyst I-III (Systems/Network Analyst 1-3)
  • Technical Analyst I-III (Technical Analyst 1-3)
  • Information Technology Support Technician I-III (IT Support Tech 1-3)

Requests submitted by UNM staff who do not have an appropriate job description cannot be processed.

NOTE: Faculty and administrative staff in need of assistance with this request type are encouraged to contact their area's designated IT Officer or Liaison.

What information is required to submit a request?

Requestors shall provide a clear and concise question in the description of the request.

Requests that are overly broad or that lack specificity cannot be processed.

What is the cost of this request?

This request type is provided to all IT support units at no-cost.

Requests that deviate from the standard offering are evaluated on a case-by-case basis and may result in a fee in scenarios where additional resources including, but not limited to, hardware, software, staff time, or other materials are required to support such requests.

Where can I submit this request?

All requests submitted to the University's Information Security & Privacy Office (ISPO) shall be submitted by University-defined Information Technology staff in Help.UNM Self-Service to ensure that each request is opened, tracked, and processed in a timely manner.

Requests submitted outside of the Help.UNM Self-Service portal (e.g. Cherwell Service Management client application, RightNow's 'Ask a Question' feature, or the QuickIT portal) cannot be processed.

When can I submit this request?

Requests may be submitted at any time.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be processed?

Requests that include all minimum-required information at the time of submission, are processed during standard business hours (i.e. 08:00 to 17:00 Mountain Time), Monday through Friday, excluding weekends and holidays.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be fulfilled?

This request type is typically fulfilled within a seven (7) business day period, with most being fulfilled within the ten (10) business day period specified in the Service-Level Agreement (SLA) for this request type.

Requests are prioritized based on resource availability including, but not limited to, hardware, software, and staff, and cannot be expedited.

How can I submit this request?

Requests shall be submitted in Help.UNM Self-Service.

Navigate to Help.UNM > Make a Request > Information Security and Privacy Services > Information Security Services > Category: Business Continuity Access Request > Describe > Submit.

Who can submit a request?

Blah...

What information is required to submit a request?

Blah...

What is the cost of this request?

Blah...

Where can I submit this request?

Blah...

When can I submit this request?

Blah...

When will my request be processed?

Blah...

When will my request be fulfilled?

Blah...

How can I submit this request?

Blah...

Other Information...

Who can submit a request?

Blah...

What information is required to submit a request?

Blah...

What is the cost of this request?

Blah...

Where can I submit this request?

Blah...

When can I submit this request?

Blah...

When will my request be processed?

Blah...

When will my request be fulfilled?

Blah...

How can I submit this request?

Blah...

Other Information...

Who can submit a request?

University staff selecting this request type shall have an appropriate University-defined cybersecurity or information technology-focused job description (i.e. position classification). For more information about UNM's Job Descriptions, please reference the UNM Human Resources Position Classification Description Listing website for more information.

Cybersecurity Roles
Information Security Officers
  • University Information Security & Privacy Officer (Info Security Ofcr)
  • Information Security Officer (Info Security Ofcr)
Cybersecurity Engineers
  • Cybersecurity Engineer I-III (Cybersecurity Engineer 1-3)
IT Roles
IT Directors and Associate IT Directors
  • Director of Core Information Technology Services (Dir,Core IT Svcs)
  • Director of Information Technology Service (Dir,IT Svcs)
  • Associate Director of Core Information Technology Services (Assoc Dir,Core IT Svcs)
  • Associate Director of Information Technology Services (Assoc Dir,IT Svcs)
IT Managers
  • Manager of Core Information Technology Services (Mgr,Core IT Svcs)
  • Manager of Information Technology Services (Mgr,IT Svcs)
IT Officers
  • IT Officer (IT Officer)
IT Project Managers
  • IT Project Manager I-III (IT Project Mgr 1-3)
IT Specialists, IT Analysts, and IT Technicians
  • Senior Core Information Technology Services Specialist (Sr Core IT Svcs Splst)
  • Core Information Technology Services Specialist (Core IT Svcs Splst)
  • Programmer Analyst I-III (Programmer Analyst 1-3)
  • Systems/Network Analyst I-III (Systems/Network Analyst 1-3)
  • Technical Analyst I-III (Technical Analyst 1-3)
  • Information Technology Support Technician I-III (IT Support Tech 1-3)

Requests submitted by UNM staff who do not have an appropriate job description cannot be processed.

Departments
  • IT - Campus Outreach & Engagement
  • IT - Computing Platforms
    • Enterprise Managed Systems & Services (EMSS)
      • Systems
      • Workstations
  • University Libraries IT

Requests submitted by UNM staff who are not directly assigned to a department or area listed above cannot be processed.

NOTE: Faculty and administrative staff in need of assistance with this request type are encouraged to contact their area's designated IT Officer or Liaison.

What information is required to submit a request?

Requestors shall provide a clear and concise overview of their requirements in the description of their request and a thoroughly completed Network Access Reinstatement Form which shall be attached to the request record at the time of submission.

Requests that are overly broad or that lack specificity, or that do not include a Network Access Reinstatement Form cannot be processed.

What is the cost of this request?

This request type is provided to all IT support units at no-cost.

Requests that deviate from the standard offering are evaluated on a case-by-case basis and may result in a fee in scenarios where additional resources including, but not limited to, hardware, software, staff time, or other materials are required to support such requests.

Where can I submit this request?

All requests submitted to the University's Information Security & Privacy Office (ISPO) shall be submitted by University-defined Information Technology staff in Help.UNM Self-Service to ensure that each request is opened, tracked, and processed in a timely manner.

Requests submitted outside of the Help.UNM Self-Service portal (e.g. Cherwell Service Management client application, RightNow's 'Ask a Question' feature, or the QuickIT portal) cannot be processed.

When can I submit this request?

Requests may be submitted at any time.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be processed?

Requests that include all minimum-required information at the time of submission, are processed during standard business hours (i.e. 08:00 to 17:00 Mountain Time), Monday through Friday, excluding weekends and holidays.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be fulfilled?

This request type is typically fulfilled within a five (5) business day period, with most being fulfilled within the ten (10) business day period specified in the Service-Level Agreement for this request type.

Requests are prioritized and fulfilled based on resource availability including, but not limited to, hardware, software, staff, and cannot be expedited.

How can I submit this request?

Requests shall be submitted in Help.UNM Self-Service.

Navigate to Help.UNM > Make a Request > Information Security and Privacy Services > Information Security Services > Category: Business Continuity Access Request > Describe > Submit.

Who can submit a request?

Blah...

What information is required to submit a request?

Blah...

What is the cost of this request?

Blah...

Where can I submit this request?

Blah...

When can I submit this request?

Blah...

When will my request be processed?

Blah...

When will my request be fulfilled?

Blah...

How can I submit this request?

Blah...

Other Information...

Who can submit a request?

University staff selecting this request type shall have an appropriate University-defined cybersecurity or information technology-focused job description (i.e. position classification). For more information about UNM's Job Descriptions, please reference the UNM Human Resources Position Classification Description Listing website for more information.

CIO Roles
Chief Information Officer
  • Chief Information Officer (Chief Information Officer)
  • Deputy Chief Information Officer (Deputy CIO)
Cybersecurity Roles
Information Security Officers
  • University Information Security & Privacy Officer (Info Security Ofcr)
  • Information Security Officer (Info Security Ofcr)
Cybersecurity Engineers
  • Cybersecurity Engineer I-III (Cybersecurity Engineer 1-3)
IT Roles
IT Directors and Associate IT Directors
  • Director of Core Information Technology Services (Dir,Core IT Svcs)
  • Director of Information Technology Service (Dir,IT Svcs)
  • Associate Director of Core Information Technology Services (Assoc Dir,Core IT Svcs)
  • Associate Director of Information Technology Services (Assoc Dir,IT Svcs)
HR Roles
HR Officers
  • Vice President of Human Resources / Chief Human Resources Officer (VP HR,Chief HR Officer)
HR Directors
  • Director of Human Resources Services (Dir,HR Services)
HR Managers
  • Manager of Human Resources Services Client Services (Mgr,HR Client Services)
HR Consultants, Administrators, Analysts, and Technicians
  • Senior Human Resources Consultant (HR Consultant,Sr)
  • Human Resources Consultant (HR Consultant)
  • Human Resources Administrator 1-3 (HR Administrator I-III)
  • Senior Human Resources Analyst (HR Analyst,Sr)
  • Human Resources Analyst (HR Analyst)
  • Senior Human Resources Technician (HR Tech,SR)
  • Human Resources Technician (HR Tech)
LER Roles
Labor and Employee Relations Officers
  • Labor/Employee Relations Officer (Labor/Employee Relations Ofcr)
Labor and Employee Relations Specialists and Analysts
  • Labor/Employee Relations Specialist (Labor/Employee Relations Splst)
  • Labor/Employee Relations Analyst (Labor/Employee Rltns Analyst)

Requests submitted by UNM staff who do not have an appropriate job description cannot be processed.

What information is required to submit a request?

Requestors shall provide a clear and concise description of their request, all accounts owned or used by the in-scope staff, and an authorization memorandum signed by a cognizant University vice president.

Requests that do not include a signed authorization memorandum cannot be processed.

What is the cost of this request?

This request type is provided to all human resources, information technology, and labor and employee relations areas at no-cost.

Requests that deviate from the standard offering are evaluated on a case-by-case basis and may result in a fee in scenarios where additional resources including, but not limited to, hardware, software, staff time, or other materials are required to support such requests.

Where can I submit this request?

All requests submitted to the University's Information Security & Privacy Office (ISPO) shall be submitted by University-defined Information Technology staff in Help.UNM Self-Service to ensure that each request is opened, tracked, and processed in a timely manner.

Requests submitted outside of the Help.UNM Self-Service portal (e.g. Cherwell Service Management client application, RightNow's 'Ask a Question' feature, or the QuickIT portal) cannot be processed.

When can I submit this request?

Requests may be submitted at any time.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be processed?

Requests that include all minimum-required information at the time of submission, are processed during standard business hours (i.e. 08:00 to 17:00 Mountain Time), Monday through Friday, excluding weekends and holidays.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

NOTE: In the event initial processing and fulfillment of an individual request needs to be expedited, the requestor is responsible for communicating details regarding urgency and impact, and specifics regarding desired timing of activities.

When will my request be fulfilled?

This request type is typically fulfilled within a one (1) business day period, with most being fulfilled within the three (3) business day period specified in the Service-Level Agreement for this request type.

Requests are prioritized and fulfilled based on resource availability including, but not limited to, hardware, software, and staff.

NOTE: In the event initial processing and fulfillment of an individual request needs to be expedited, the requestor is responsible for communicating details regarding urgency and impact, and specifics regarding desired timing of activities.

How can I submit this request?

Requests shall be submitted in Help.UNM Self-Service.

Navigate to Help.UNM > Make a Request > Information Security and Privacy Services > Information Security Services > Category: Business Continuity Access Request > Describe > Submit.

Who can submit a request?

University staff selecting this request type shall have an appropriate University-defined cybersecurity or information technology-focused job description (i.e. position classification). For more information about UNM's Job Descriptions, please reference the UNM Human Resources Position Classification Description Listing website for more information.

Cybersecurity Roles
Information Security Officers
  • University Information Security & Privacy Officer (Info Security Ofcr)
  • Information Security Officer (Info Security Ofcr)
Cybersecurity Engineers
  • Cybersecurity Engineer I-III (Cybersecurity Engineer 1-3)
IT Roles
IT Directors and Associate IT Directors
  • Director of Core Information Technology Services (Dir,Core IT Svcs)
  • Director of Information Technology Service (Dir,IT Svcs)
  • Associate Director of Core Information Technology Services (Assoc Dir,Core IT Svcs)
  • Associate Director of Information Technology Services (Assoc Dir,IT Svcs)
IT Managers
  • Manager of Core Information Technology Services (Mgr,Core IT Svcs)
  • Manager of Information Technology Services (Mgr,IT Svcs)
IT Officers
  • IT Officer (IT Officer)
IT Project Managers
  • IT Project Manager I-III (IT Project Mgr 1-3)
IT Specialists, IT Analysts, and IT Technicians
  • Senior Core Information Technology Services Specialist (Sr Core IT Svcs Splst)
  • Core Information Technology Services Specialist (Core IT Svcs Splst)
  • Programmer Analyst I-III (Programmer Analyst 1-3)
  • Systems/Network Analyst I-III (Systems/Network Analyst 1-3)
  • Technical Analyst I-III (Technical Analyst 1-3)
  • Information Technology Support Technician I-III (IT Support Tech 1-3)

*Eligibility applicable only to UNM IT's Applications department.

Requests submitted by UNM staff who are not directly assigned to a department or area listed above cannot be processed.

NOTE: Faculty and administrative staff in need of assistance with this request type are encouraged to contact their area's designated IT Officer or Liaison.

What information is required to submit a request?

Requestors shall provide a clear and concise overview of their requirements including all in-scope networks and/or subnetworks in the description of their request.

Requests that are overly broad or that lack specificity cannot be processed. Any vulnerability assessment requests for an area that the requestor is not responsible for or a part of cannot be processed and will be cancelled.

What is the cost of this request?

This request type is provided to all IT support units at no-cost.

Requests that deviate from the standard offering are evaluated on a case-by-case basis and may result in a fee in scenarios where additional resources including, but not limited to, hardware, software, staff time, or other materials are required to support such requests.

Where can I submit this request?

All requests submitted to the University's Information Security & Privacy Office (ISPO) shall be submitted by University-defined Information Technology staff in Help.UNM Self-Service to ensure that each request is opened, tracked, and processed in a timely manner.

Requests submitted outside of the Help.UNM Self-Service portal (e.g. Cherwell Service Management client application, RightNow's 'Ask a Question' feature, or the QuickIT portal) cannot be processed.

When can I submit this request?

Requests may be submitted at any time.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be processed?

Requests that include all minimum-required information at the time of submission, are processed during standard business hours (i.e. 08:00 to 17:00 Mountain Time), Monday through Friday, excluding weekends and holidays.

Requests that are submitted after hours, including nights, weekends, and holidays will be processed the next business day during standard business hours.

When will my request be fulfilled?

This request type is typically fulfilled within a ten (10) business day period beginning with a mutually determined assessment window, with most being fulfilled within the twenty (20) business day period specified in the Service-Level Agreement for this request type.

Requests are prioritized and fulfilled based on resource availability including, but not limited to, hardware, software, staff, and cannot be expedited.

How can I submit this request?

Requests shall be submitted in Help.UNM Self-Service.

Navigate to Help.UNM > Make a Request > Information Security and Privacy Services > Information Security Services > Category: Business Continuity Access Request > Describe > Submit.


Report an Incident

If you suspect that your NetID (i.e. LoboMail account) or a computer have been compromised and you need to know what to do, please see our FAQ

Abuse Report Form

- or -

Report Message: Junk

 - or -

Report Message: Phishing

 - or - 

Help.UNM Self Service

 - or -

UNM EthicsPoint


For more information, visit our Contact Information page