Access to Secure Locations
Process Owners
As of May 2025, this process is owned by multiple groups within the Division of Information Technology (DoIT) and the Department of Computer Sciences.
DoIT Data Center Team
The DoIT Data Center Team owns the process of receiving, assigning, and communicating access to secure locations associated with the DoIT Data Center located in the basement of the Computer Sciences Building.
Primary Contact
Chris Lund, DoIT Data Center Operations Manager (608) 262-6149
DoIT Internal Operations Team
The DoIT Internal Operations Team owns the process of receiving, assigning, and communicating access to secure locations associated with Rust-Schreiner Hall and the Middleton Building.
Primary Contact
Christine Congdon, DoIT Internal Operations Manager (608) 890-0866
DoIT Network Services
The DoIT Network Services owns the process of receiving, assigning, and communicating access to secure locations associated with Network Services in the basement of the Computer Sciences Building.
Primary Contact
Bill Foster, DoIT Network Services Infrastructure & Operations Associate Director (608) 263-6307
Gary Northey, DoIT Network Services Field Services Associate Director (608) 890-1797
CDIS Data Center Team
The CDIS IT Team owns the process of receiving, assigning, and communicating access to secure locations associated with the CDIS Data Center located in Unit 3 of the Computer Sciences Building.
Primary Contacts
Nick Petska, Lab Director (608) 262-1017
John Perkins (608) 262-0438
Requesting Access
DoIT managers or supervisors will request access to secure locations on behalf of their team members.
Within the request they will share:
- The first and last name of the staff member
- The first 6 digits on the back (under magnetic stripe) of the staff member’s Wiscard
- The secure location(s) they need access to
- A start and end date if applicable
Requests will be made in writing by emailing:
- dcteam@doit.wisc.edu - For access to doors and rooms associated with the DoIT Data Center located in the basement of the Computer Sciences Building.
- internal-operations-team@office365.wisc.edu - For access to doors and rooms associated with Rust-Schreiner Hall and The Middleton Building.
- william.foster@wisc.edu or gary.northey@wisc.edu - For access to doors and rooms associated with Network Services in the basement of the Computer Sciences Building.
- lab@cs.wisc.edu - For access to doors and rooms associated with the CDIS Data Center located in Unit 3 of the Computer Sciences Building.
Campus vendors or contractors may contact the UW-Madison Police Department (UWPD) Access Control Office directly requesting access to secure locations based on work they need to do in a building. In these cases, UWPD Access Control will email the Building Contact to confirm if access can be granted and who will add access.
Based on the request, the Building Contact will include the appropriate process owner when replying to UWPD Access Control, so access can be received, reviewed, and confirmed in a timely fashion.
Assigning Access
Upon receiving a request for access, the process owner will log into the Non-UWPD Lenel Web Client to add access levels to a Wiscard holder.
The process owner will communicate with the requester, confirming that access has been granted and that the cardholder should now be able to access the secure location(s) within buildings occupied by the Division of Information Technology (DoIT).
If the process owner needs assistance accessing the Non-UWPD Lenel Web Client or assigning secure access, they will contact the UW-Madison Police Department (UWPD) Access Control Office.
Reviewing and Updating Access
[Content placeholder inside panel Reviewing and Updating Access. This content will be shown/hidden as the panel is toggled.]