Creating a New IT Purchase Authorization Request
This article covers how users can create and submit a new IT Purchase Authorization Request.
For instructions on how to access the IT Service Request Forms, view this article on logging in.
1. Click on Other Services.
Click on Other Services in the IT Request Forms section.
2. Select IT Purchase Authorization.
3. Enter Product/Service Information.
Hover your mouse over the question mark/info button next to a field to see if that field is mandatory.
When entering a Total or Annual Cost, do not use any symbols such as a comma or dollar sign (e.g. $50,000). Periods are okay (e.g. 5000.95).
- Enter the name of the vendor/supplier of the product/service.
- Enter the website of the vendor/supplier.
- Enter the manufacturer of the product/service (if different from the vendor/supplier).
- Enter the total cost of the purchase from this vendor.
- Select the primary source of funding to be used for this purchase.
3.1. Click Add Attachment to attach relevant documentation such as the vendor quote.
When you are ready to add your attachments (e.g. vendor quote, software license end user agreement, VPAT, etc), click Add Attachment.
Failing to attach required documentation will slow down the processing of your request so be sure to attach all relevant documentation.
4. Select all categories for the product/service you are purchasing.
Place a checkmark next to each category that applies to the product(s)/service(s) included in your purchase.
It's important to select the correct category (or categories) for a request to ensure that it is sent to the correct IT approvers and processed properly. If you are not sure which category to select, contact firstname.lastname@example.org.
4.1. Make a note of any pop-up windows that appear.
When you place a checkmark next to certain categories, you will see a pop-up window that includes additional requirements/documentation for your request. Be sure to follow the instructions in order to ensure your request is processed as quickly as possible.
4.2. If you select Other, you will need to type in an explanation.
If none of the categories apply to your purchase, you may choose Other and then type an explanation of the product/service you are using.
Remember you can contact email@example.com if you are unsure which category to pick.
5. Describe the Usage for the product/service.
5.1. Enter a description of the purpose of the product/service.
Enter the purpose of the product/service: what does it do? how will it be used? Be as descriptive as possible.
5.2. Indicate if the product/service/hardware will be used to store, transmit, or process credit card information or impact the security over credit card information.
This question is NOT asking if you will be using a credit card/p-card to purchase the product/service/hardware.
This question is asking if the product/service/hardware will in any way interact with credit card information which requires specific security protocols to process.
5.3. Select who will use this product/service.
Place a checkmark to indicate which population will use the product/service.
- One or more students in an academic setting (e.g. one or more students will use this product/service in a classroom or lab or instructional setting)
- For individual use by one or more University employees whose accessible technology accommodations are not applicable to this procurement at this time (e.g. one or more specific employees will be using this product/service and accessibility needs are either being met or are not needed)
- University employees whose accessible technology accommodations are unknown (e.g. more than one employee will be using this product/service and you do not know if these employees require accessibility accommodations to use the product/service)
- The general public/Campus wide (e.g. the product/service will be made publicly available on the campus website or the product/service will be made available to all students and employees)
5.4. Indicate if other departments or groups on campus may be interested in using this product.
It is helpful for the IT department to know if the product has relevance for other users on campus. This allows IT to recommend products when they receive inquiries as well as determine if a campus-wide license or group licenses would be beneficial.
6.1. Enter the Hardware/Equipment Type and the Maintenance Support Plan information.
- Enter the name of the hardware that you are purchasing (e.g. Apple iPad Pro).
- Enter the maintenance support plan for the hardware. In other words, who will fix any issues with this hardware or replace it if it is broken? (e.g. Apple Care support plan)
6.2. Enter the quantity of each type of hardware category will be purchased. Then enter the total cost of the hardware portion of your request.
Enter the number of each type of hardware that you are purchasing. Then enter the total cost of the hardware that you are purchasing.
If you are ordering a type of hardware not listed (e.g. audiovisual equipment, etc), you can leave each of the fields blank and simply enter a Hardware total cost.
7.1. Enter the Software name/type and the Support Plan information.
- Enter the name of the software that you are purchasing (e.g. Adobe Captivate 2019). It may also help to expand on the name to describe what type of product it is (e.g. Adobe Captivate 2019: a product for creating elearning content).
- Enter the support plan for the software. In other words, who will fix any issues with this software? (e.g. Adobe Tech Support)
7.2. If prompted, select whether your software includes cloud/hosted services
Cloud or hosted services are those not provided with a physical server.
7.3. If your software includes cloud/hosted services, select the type of data that will be used with your product/service.
Specify the type of data that will be used with your cloud/hosted product/service.
If you are not sure which data classification applies, click Show Data Classifications for additional detail.
7.3.1. If you select Level 1 or 2 Data, you will see a notation that the Information Security Office will follow up with you to collect more details. There is also a chart to determine the acceptable type of documentation to provide to the ISO.
- You will see a notation that the CSUF Information Security Office (ISO) will contact you for additional details.
- In the displayed chart you will see acceptable documentation that the ISO will need depending on the data classification and number of records.
7.3.2. If you select Level 3, place a checkmark to acknowledge that only Level 3 data will be used.
7.4. Indicate whether the software/service requires a login and whether the software/service supports single sign-on (SSO) authentication.
- Indicate if users will need to login to access the software/service using a web-based interface (e.g., signing in to Google.com to use Google Docs).
- Indicate if the software/service supports single sign-on (SSO) authentication.
- If you choose Yes for the SSO authentication, indicate which types of SSO the vendor supports.
Depending on your selections above, the VPAT section will appear if it is required.
8.1. Read through the instructions/options for the VPAT.
8.2. Select the VPAT option that applies to your request.
8.2.1. I have the VPAT attached
If you select I have the VPAT attached, you can use the Add Attachment button to attach the VPAT file (PDF is preferred).
You can use the Add Attachment button at the top or bottom of the IT Purchase Authorization form to attach documentation, including the VPAT.
8.2.2. I need to collect the VPAT and will submit it when available
If you select I need to collect the VPAT and will submit it when available, you will see a notation that you will receive an email asking you to return to this form with the VPAT when it is completed.
Your IT Purchase Authorization request will not move forward in the approval process until a VPAT is attached to the request.
If you are ultimately unable to obtain a VPAT for your request, please contact firstname.lastname@example.org.
8.2.3. I am unable to find a supplier that meets these standards
If you select I am unable to find a supplier that meets these standards, you will see a notation that you will receive an email requesting that you submit an Equally Effective Alternate Access Plan (EEAAP).
9. Click Proceed to Checkout when you have completed filling out the form and adding attachments.
After you have completed the form and added all of your required attachments, click Proceed to Checkout.
10. Modify the Requested For field to the name of the Responsible Person and enter any additional comments/instructions.
- Select the name of the Responsible Individual for this product/service. This is the person who will actually be using the product/service. Often this is the person who asked you to purchase the product/service for the department.
- Enter any special instructions or additional comments about this purchase that you would like to include.
The person in the Requested For field will receive a copy of this request after you submit it.
12. The request is submitted! Make a note of the REQ and RITM numbers.
You can use the REQ number or the RITM number when contacting the IT Help Desk or an IT Subject Matter Expert to follow up on this request.
Need More Help?
Contact the IT Purchasing Team at email@example.com or call the IT Help Desk at 657-278-7777.