0% found this document useful (0 votes)
65 views

Step 1: Choose Responsibilities: Data Access Approver List Data Steward List

The document outlines a 4 step process for assigning system access responsibilities to employees: 1) The supervisor and employee determine the necessary system access based on job duties and select the appropriate responsibilities from provided toolkits. 2) The supervisor, employee, or approver submits a request for the responsibilities via the ESHARP system. 3) The employee completes any required training by finding the relevant learning paths and instructions. 4) The computer support person prepares the employee's computer with the necessary software and VPN access for the responsibilities.

Uploaded by

anishokm2992
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views

Step 1: Choose Responsibilities: Data Access Approver List Data Steward List

The document outlines a 4 step process for assigning system access responsibilities to employees: 1) The supervisor and employee determine the necessary system access based on job duties and select the appropriate responsibilities from provided toolkits. 2) The supervisor, employee, or approver submits a request for the responsibilities via the ESHARP system. 3) The employee completes any required training by finding the relevant learning paths and instructions. 4) The computer support person prepares the employee's computer with the necessary software and VPN access for the responsibilities.

Uploaded by

anishokm2992
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Step 1: Choose Responsibilities

The supervisor and employee determine what system access the employee needs to do his
or her job and what responsibility(s) to request.

Review the toolkits below for lists of system responsibilities and descriptions (choose the
responsibility(s) that most closely align with the employee's job duties).

HR/Finance toolkits
Student Information System (SIS) toolkits
Document Imaging System toolkits

Contact the appropriate personnel familiar with the responsibilities for assistance:

For SIS data access approver list


For Document Imaging data steward list

Step 2: Request Responsibilities

The supervisor, employee, or departmental data access approver submits the request for
system responsibility(s) via ESHARP.

For questions, see Access FAQs, visit the ESHARP website or contact the UVa Help Desk at
434-924-HELP(4357) or 4HELP@virginia.edu.

Step 3: Complete Training

Before enrolling, find out the names of the Learning Path the employee needs to complete.
Use the toolkits in Step 1 to search for each responsibility requested in Step 2, and view the
appropriate "Responsibilities and Training" toolkit table.
To ensure successful completion of a Learning Path for a responsibility, the employee should
print and follow the Instructions for Completing a Learning Path.
Contact the system trainers:
o when the learning path for a responsibility has been completed, or
o for questions regarding training.

Step 4: Prepare Computer for Access

The LSP or the employee (if there is not a departmental computer support person) prepares
the employee's computer for access:

Request and pick up a UVa Identity Token:


Install UVa VPN software after getting the UVa Identity Token. When you go to the website,
select the JointVPN service.
Verify the software on the computer is compatible with the Enterprise Applications systems.
If required (many HR/Finance responsibilities and Discoverer), set up Java/JRE on employee's
computer (if you need assistance, contact departmental LSP or UVa Help Desk)
For questions, contact the departmental LSP or the UVa Help Desk at 434-924-HELP(4357) or
4HELP@virginia.edu.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy