Access to Secure Locations

This document explains the process and procedures associated with requesting, receiving, assigning, and communicating access to secure locations within buildings occupied by the Division of Information Technology (DoIT).

Process Owners

As of May 2025, this process is owned by multiple groups within the Division of Information Technology (DoIT) and the Department of Computer Sciences.

DoIT Data Center Team

The DoIT Data Center Team owns the process of receiving, assigning, and communicating access to secure locations associated with the DoIT Data Center located in the basement of the Computer Sciences Building.

Primary Contact

Chris Lund, DoIT Data Center Operations Manager (608) 262-6149

DoIT Internal Operations Team

The DoIT Internal Operations Team owns the process of receiving, assigning, and communicating access to secure locations associated with Rust-Schreiner Hall and the Middleton Building.

Primary Contact

Christine Congdon, DoIT Internal Operations Manager (608) 890-0866

DoIT Network Services

The DoIT Network Services owns the process of receiving, assigning, and communicating access to secure locations associated with Network Services in the basement of the Computer Sciences Building.

Primary Contact

Bill Foster, DoIT Network Services Infrastructure & Operations Associate Director (608) 263-6307

Gary Northey, DoIT Network Services Field Services Associate Director (608) 890-1797

CDIS Data Center Team

The CDIS IT Team owns the process of receiving, assigning, and communicating access to secure locations associated with the CDIS Data Center located in Unit 3 of the Computer Sciences Building.

Primary Contacts

Nick Petska, Lab Director (608) 262-1017

John Perkins (608) 262-0438 

Requesting Access

DoIT managers or supervisors will request access to secure locations on behalf of their team members.

Within the request they will share:

  • The first and last name of the staff member
  • The first 6 digits on the back (under magnetic stripe) of the staff member’s Wiscard
  • The secure location(s) they need access to
  • A start and end date if applicable

Requests will be made in writing by emailing:

Campus vendors or contractors may contact the UW-Madison Police Department (UWPD) Access Control Office directly requesting access to secure locations based on work they need to do in a building. In these cases, UWPD Access Control will email the Building Contact to confirm if access can be granted and who will add access.

Based on the request, the Building Contact will include the appropriate process owner when replying to UWPD Access Control, so access can be received, reviewed, and confirmed in a timely fashion.

Assigning Access

Upon receiving a request for access, the process owner will log into the Non-UWPD Lenel Web Client to add access levels to a Wiscard holder.

The process owner will communicate with the requester, confirming that access has been granted and that the cardholder should now be able to access the secure location(s) within buildings occupied by the Division of Information Technology (DoIT).

If the process owner needs assistance accessing the Non-UWPD Lenel Web Client or assigning secure access, they will contact the UW-Madison Police Department (UWPD) Access Control Office.

Reviewing and Updating Access

[Content placeholder inside panel Reviewing and Updating Access. This content will be shown/hidden as the panel is toggled.]



Keywords:
Lenel, secure access, access control 
Doc ID:
150934
Owned by:
Christine C. in DoIT Internal Ops
Created:
2025-05-19
Updated:
2025-05-20
Sites:
DoIT Internal Operations Team