Custom IT Projects

Description

If you have an IT need that is not met by an existing service, we can work with you to identify possible solutions and provide detailed price estimates on implementing those solutions.

Access

At a minimum, your project request must include:

  • Project Name or suggested name.

  • Project Sponsor Name and Email - An individual with operational authority at the University to authorize resources, allocate budget, and make policy decisions that enable the project team to deliver solutions.

  • Project Description & Requirements - Detailed description of the project's purpose, its intended business value, and a list of all requirements the project must meet.

  • Risks if project not completed by preferred completion date - Describe risks or potential disruptions if project is not completed.

  • Project Advantages - Describe benefits/outcomes of implementing project.

  • Additional fields are available on the project request form. Completing the form in full better assists our team in evaluating your request. Failing to do so may result in prolonged analysis and planning time for your request.

Who can access

  • Faculty and staff who have budget authority and/or their delegate.

    • Students who would like to request an IT project should work with a faculty of staff member to sponsor their request.

Additional resources

Service support

Get help

  • Visit the Technology Help Center (help.ohio.edu) to get live support, view outages, and browse trainings.

Accessibility

Ohio University strives to make its digital resources and services accessible to all visitors, including those with disabilities who may also be using assistive technology. If special steps are necessary in order to improve the accessibility of experiences for end users, those steps must be taken. 
 
If you experience a barrier that affects your ability to access OHIO websites, videos, online forums, documents, or other information technology, please let us know
For further information about OHIO's digital accessibility resources, see:

Security

The Ohio University Information Security Office strives to educate and empower the University community to appropriately manage risks and protect OHIO’s information and systems. This effort is facilitated through policies, standards, an information security risk management program, as well as other tools and guidance that are provided to the University community. This modern approach creates a safe computing environment in which the university community can teach, learn, and conduct research. 

For additional information about OHIO’s security resources, see: