Description
If you have an IT need that is not met by an existing service, we can work with you to identify possible solutions and provide detailed price estimates on implementing those solutions.
Access
At a minimum, your project request must include:
-
Project Nameor suggested name.
-
Project Sponsor Name and Email - An individual with operational authority at the University to authorize resources, allocate budget, and make policy decisions that enable the project team to deliver solutions.
-
Project Description & Requirements - Detailed description of the project's purpose, its intended business value, and a list of all requirements the project must meet.
-
Risks if project not completed by preferred completion date -Describe risks or potential disruptions if project is not completed.
-
Project Advantages - Describe benefits/outcomes of implementing project.
-
Additional fields are available on the project request form. Completing the form in full better assists our team in evaluating your request. Failing to do so may result in prolonged analysis and planning time for your request.
Who can access
Additional resources
Service support
Get help
- Visit the Technology Help Center ( help.ohio.edu
) to get live support, view outages, and browse trainings.
Accessibility
Ohio University strives to make its digital resources and services accessible to all visitors, including those with disabilities who may also be using assistive technology. If special steps are necessary in order to improve the accessibility of experiences for end users, those steps must be taken.
If you experience a barrier that affects your ability to access OHIO websites, videos, online forums, documents, or other information technology, please let us know
.
For further information about OHIO's digital accessibility resources, see:
Security
The Ohio University Information Security Office
strives to educate and empower the University community to appropriately manage risks and protect OHIO’s information and systems. This effort is facilitated through policies, standards, an information security risk management program, as well as other tools and guidance that are provided to the University community. This modern approach creates a safe computing environment in which the university community can teach, learn, and conduct research.
For additional information about OHIO’s security resources, see: