Information Security and IT Compliance Services

Tools and Services 

Browse commonly used Information Security and IT Compliance (ISIC) tools and services below. The ISIC team provides several services to keep your information and the university's data safe. Services provided include monitoring, protecting and securing our information technology infrastructure, data and operations to safeguard the privacy of the university community while maintaining compliance with applicable policies, laws and regulations. 

For information technology services, visit our Information Strategy and Services partner at the Office of Information Technology (OIT) website or contact the Service Desk for additional questions. 

Data Access Requests

Category: IT Security Productivity and Business Remote Access Audience: Faculty Researchers Staff
Data access requests can be made with appropriate permissions from data owners and initiated by the supervisor of the person in question, or by the department administrator.
For accessing a specific user's data, all non-emergency requests for access to another user’s data must be approved by HR and Legal before access is granted. If the approval is granted by HR and Legal, the IT Security and Compliance Team will coordinate the data transfer with the appropriate team(s) and the requesting department.

Instructions for submitting the Data Access Request (DAR) Form in the Service Center:
  • Log in to the Service Center (in the upper right hand corner) using your university credentials
  • Click on Make a Request
  • Scroll down to click on Security Services
  • Select Data Access Request and click New
  • Complete the Data Access Request form

Information Security and IT Compliance

CU Anschutz

Education II North

13120 East 19th Avenue

5th Floor

Aurora, CO 80045


CMS Login