-
Banner
Banner Policy
A request for a Banner account and the desired access must be sent by the employee's supervisor to the Enterprise Services (Banner security administrator) to techsupp@gsw.edu. Access must be requested by form and process/job or by specific security class. It cannot be requested as "give access the same as ...". The account will not be created until the employee's personal information has been added to Banner by Human Resources and a Personnel Action notice is received by the IIT department.
Users will be required to sign a usage and confidentiality agreement. Once an account has been established, the user will be notified of login information and sent instructions for logging into Banner.
As new programs are created in Banner, individual access will be granted to a user's access class as needed. A request must be submitted by the user's supervisor to techsupp@gsw.edu. If the desired program contains information that is part of another office's "domain," the data custodian must grant permission for access. The data custodian must indicate whether access is query or modify. If not specified, the access will be granted as query only. Tabbed forms, specifically SPAIDEN, must indicate for which tabs access is granted. Those not specified will be set to "not displayed." Forms and processes and their data custodians are:
G% (General) Banner Project Leader R% (Financial Aid) Director of Financial Aid SA% (Admission) Director of Admissions SC% (Catalog) Registrar SE% (Support Services) Banner Project Leader SF% (Registration) Registrar SG% (General Student) Registrar SH% (Academic History) Registrar SI% (Faculty) Associate Vice President of Academic Affairs SL% (Location Management) Assistant Director of Residence Life SO% (Student System Management) Registrar SP% (General Person) Registrar SR% (Recruit) Director of Admissions SS% (Schedule) Registrar ST% (Student Validation Tables) Banner Project Leader T% (Accounts Receivable) Comptroller/Director of Student Accounts ZF% (Hope) Director of Financial Aid ZG% (Accounts Receivable) Comptroller/Director of Student Accounts ZH% (Student/Hope) Registrar/Director of Financial Aid ZL% (Location Management) Assistant Director of Residence Life ZO% (Admissions) Director of Admissions ZP% (Student) Registrar ZS% (Student/Accounts Receivable) Registrar/Comptroller/Director of Student Accounts ZT% (GaMods Validation Tables) Banner Project Leader ZU% (Accounts Receivable) Comptroller/Director of Student Accounts Any forms or processes not covered by the above list must be approved by the Banner Project Leader.
Faculty and staff account access privileges are reviewed by the appropriate data custodians every three months. The review findings are presented to the GSW Banner DBA. The findings are then filed with the GSW ISO/CIO. Faculty and staff accounts are removed from Banner upon termination, resignation, and retirement. For more information regarding account lockout after non-usage, refer to the Banner Account Non-Usage Standard.
How-To Guides
- Personal Menu A personal menu includes the forms, jobs, menus, and QuickFlows that are most important in your daily work. You can access your personal menu from the main menu.
- QuickFlow A QuickFlow is a technique that lets you access a set of forms in a specific sequence.
Banner Steering Committee
-
Office 365
GSW Faculty, Staff & Students can get a complete version of the latest Microsoft Office FREE for your personally-owned devices as long as you’re an employee or student.
Visit http://portal.office.com
Students: login using your entire Radar email address and your CanesNet password.
Employees: login using your CanesNet credentials.
Employees, DO NOT install this on your GSW-provided, work computers!
You can download up to 5 copies of Office 365 for your personally-owned computers and up to 5 copies for your personally-owned mobile devices.
Useful links
-
PeopleSoft
Who can get access to PeopleSoft?
Georgia Southwestern State University Staff or Faculty who need access to perform their job responsibilities, generally those who:
- Enter or update transactions
- Review transactions at a detail level
- Run queries and reports, using data available only in PeopleSoft, and
- Develop, test or support the system or its users.
Most Georgia Southwestern State University Faculty and many staff will not need direct access to the PeopleSoft database, because they will be able to view all the PeopleSoft information they need through Data Warehouse reports and queries.
How do I get access to PeopleSoft?
A request to have an account created should have been requested just before or at your time of employment by your supervisor. If this did not take place, an email can be submitted to Mr. Cody King requesting access to the required system.
What is the definition of a strong PeopleSoft password?
Each system has its "rules". To achieve the strongest possible PeopleSoft password:
- 10 characters in length
- Must contain at least 2 numeric characters and 1 upper case letter
- Allowable special characters are any of the following: ! @ # $ % ^ & * ( ) - _ = + \ | [ ] { } ; : / ? . > <
- Password history must be different for 8 consecutive passwords
- User will be locked out after 5 unsuccessful login attempts
Any other password hints?
Do not pick passwords that would be easy for someone to guess, such as a password containing:
- Your name
- Your children's or spouse's name
- Stress related words, like "deadline" or "work"
- Sports teams
- The current, or your favorite season
- Repeated characters like aaaaaaa, dddddddd
- Your favorite TV show or character
- The current month
Any words of wisdom before I sign on to PeopleSoft?
Just remember that your Password security is important to you and to the University.
As a user of any University system, you are the first line of defense to protect the information assets of Georgia Southwestern State University, as well as your own, from misuse or unauthorized access.
You are responsible for any actions taken under your ID. If you share your password, or if you choose a password that is easily guessed, it may allow someone to steal your identity, and compromise your files and data.