Information Technology Reference
In-Depth Information
INVESTIGATION REQUEST
Requestor.(Name.and.Position):
Date.of.Request:
Requesting.Department.Contact.(if.different.from.requestor):
Preferred.Method.of.Contact:. □.E-mail—Address:
.
□.Phone—Number:
Do Not Fill In—To Be Completed by CISO Ofice:
Case.#.Format:.YYYY-MMDD-#####
Investigator:
Reason.for.Request:
Names.of.Personnel.to.Be.Investigated.(Not.required.or.rec-
ommended—preferred. method. is. to. only. work. with. phone.
numbers,. computer. names,. port. or. cube. numbers. if. this. is.
possible.in.the.context.of.the.request):
Phone.numbers,.computer.names,.port.or.cube.numbers.to.
be.investigated:
Speciic.criteria.and.parameters.of.investigation:
Departmental. IT. staff. resources. available. (names. and. con-
tact.information.for.any.department.IT.staff.who.will.assist.
in.the.investigation):
We.understand.that.DoIT.will.charge.back.for.the.necessary.
work. or. contract. labor. required. to. complete. this. investiga-
tion..Initials. . . .
Low.Org.#. . . . . . .
Case.#.(if.criminal.investigation). . . . . . . . . .
 
Search WWH ::




Custom Search