Each office on the ITS network is asked to identify a primary and a secondary network contact. These individuals serve as security officers for network resources owned by the office. If an individual in the office needs access to the office’s O: drive
or to a specific printer, the request must be submitted by the primary or secondary network contact.
Ann SestiJessica Miller
Center for Multicultural Student Leadership and Engagement
- University Events- Social Equity