This service request is used as an intake for the Cybersecurity Governance, Risk, and Compliance team to review technology purchases, changes, renewals, contract language, data integrations, and other types of requests to ensure compliance with technical and cybersecurity standards or other statutory requirements. This process helps to identify if the request involves sensitive or business-critical data/services and to ensure proper controls are in place to mitigate risk to the University. This intake form should be completed by a key stakeholder in the business unit with primary responsibilities for the technology or service.