Contact Type Definitions
Compliance Posters Contact – Responsible for ensuring that the most up-to-date Compliance Posters are appropriately posted in their department.
Dept HR Contact – The employee(s) assigned to work with human resource matters in their departments, including creating or approving employee transactions.
Executive Delegate – The employee(s) designated by the President, Vice President, or Dean to serve as his or her delegate(s) to view information on positions and incumbents in the portfolio. The Executive Delegate may also receive via email information of importance regarding positions and incumbents.
Faculty Prior Approval Request Contact – Staff member in each academic department or other academic unit responsible for processing Prior Approval Request (FMM) documents.
Facilities Update Contact – A person knowledgeable regarding the location and use of rooms assigned to their organizational unit. Facilities contacts are typically administrative persons capable of answering questions related to the classification and use of rooms assigned to their organizations. They should be capable of reviewing a list of rooms and know, or be able to verify by inspection, whether information contained in the list is correct or needs changing. They should have active EIDs and be familiar with computers and the Web.
Financial Contact – The employee(s) assigned to manage funding for the department, especially those accounts that fund employee positions.
IS Day 12 Contact – An administrative person, working within the structure of the departmental chair office, who is knowledgeable about:
- Instructors and locations of organized courses.
- Keeping records that link students with instructors in individual instruction (conferences) courses.
This person needs to be accurate, quick to respond, and comfortable using a computer.
IT Application Custodian – Systems analyst or programmer; the holder of application source code and configurations; the individual charged with implementing the application development and management controls specified by the owner or the university. This custodian is responsible for the processing of information. These custodians, including entities providing outsourced information resource services to the University, must:
- Implement the application development and management controls specified by the owner or the University.
- Provide physical, virtual, and procedural safeguards—based on risk—for the application environment.
- Assist owners in evaluating the cost-effectiveness of services, controls, and monitoring.
- Assist in implementation of monitoring techniques and procedures for detecting, reporting, and investigating or troubleshooting application incidents.
IT Networking Custodian – Network manager or analyst; the holder of network configuration data; the agent charged with implementing the network controls and services specified by the owner or the University. This custodian is responsible for the transfer of information. These custodians, including entities providing outsourced information resources services to the university, must:
- Implement the network controls specified by the owner or the University.
- Provide physical and procedural safeguards for the network infrastructure.
- Assist owners in evaluating the cost-effectiveness of controls and monitoring.
- Implement the monitoring techniques and procedures for detecting, reporting, and investigating or troubleshooting network incidents.
IT Owner Contact – The authoritative head of the respective college, school, or unit. The owner is responsible for the function that is supported by the resource or for carrying out the program that uses the resources. The owner of a collection of information is the person responsible for the business results of that system or the business use of the information. Where appropriate, ownership may be shared by managers of different departments. The owner or his designated representatives are responsible for and authorized to:
- Approve access and formally assign custody of an information resources asset.
- Determine the asset's value.
- Specify and establish data control requirements that provide security and convey them to users and custodians.
- Specify appropriate controls—based on risk assessment—to protect the state's information resources from unauthorized modification, deletion, or disclosure. Controls shall extend to information resources outsourced by the university.
- Confirm that controls are in place to ensure the accuracy, authenticity, and integrity of data.
- Confirm compliance with applicable controls.
- Assign custody of information resources assets and provide the appropriate authority to implement security controls and procedures.
- Review access to lists based on documented security risk management decisions.
IT Security Custodian – Guardian or liaison to Information Security Office; the agent charged with implementing the security controls specified by the owner or the University. This custodian is responsible for assuring the secure transfer, processing, and storage of information. These custodians, including entities providing outsourced information resources services to the university, must:
- Assure the implementation of security controls specified by the owner or the University.
- Provide physical and procedural security safeguards for the information resources.
- Assist owners in evaluating the cost-effectiveness of controls and monitoring.
- Implement the monitoring techniques and procedures for detecting, reporting, and investigating security incidents.
IT Systems Custodian – System administrator or analyst; the holder of system data; the agent charged with implementing the systems controls specified by the owner or the University. This custodian is responsible for the processing and storage of information. These custodians, including entities providing outsourced information resources services to the university, must:
- Implement the system controls specified by the owner or the University.
- Provide physical and procedural safeguards for the information resources.
- Assist owners in evaluating the cost-effectiveness of controls and monitoring.
- Implement the monitoring techniques and procedures for analyzing, reporting, and investigating or troubleshooting system incidents.
Notary Public – A notary public is a public servant with statewide jurisdiction who is authorized to take acknowledgements, protest instruments permitted by law, administer oaths, take depositions, and certify copies of documents not recordable in the public records. See the Handbook of Business Procedures for more information.
Records Management and Retention Contact – Each department at the University has a responsibility to preserve and protect all records that are under its control. The best way to do this is to understand the kinds of records that your department maintains and actively manage them on a day to day basis. Each department also has the responsibility to follow the polices and procedures for good records management as set out in the Records Management Services web site.
Records Management – Contacts manage records and submit requests to dispose of state records. They are responsible for obtaining training and information regarding UT Austin records management policy. Every department is required to designate a Records Management Contact.
Space Coordinator – Space Coordinators will be authorized to make changes to space information in application WORQSpace.
Space Reviewer – Space Reviewers have view-only access to space information in the WORQSpace application.
SSN Remediation Contact – Point person managing the remediation of all business processes, electronic or manual, to eliminate the use of Social Security Numbers except as allowed by law.
Telephone Services – The Telephone Services General Contact is a liaison for all voice services; communication regarding billing issues, however, are handled through mainframe accounting contacts. Relevant services include:
- Telephone instruments, lines, and wall-jacks
- UT long distance service
- Voice mail and auto-attendant services
- Uniform Call Distribution (UCD)
- Phone books (SBC only; for UT phone books, contact Texas Student Media)
University Business Officers Council (UBOC) Contact – Members of the University Business Officers Council serve as business officers for academic and administrative units and—in collaboration with professors, administrators and staff—support of educational excellence.
WORQS Request Coordinator – The WORQS Request Coordinator contact type identifies users who can submit electronic CRIB (Construct, Remodel, Install, and Build), Event, and Services requests. The paper version of these requests is known as the SR10 request.
NOTE: An individual may have more than one role in a department and may be a contact for more than one department.