Popular Services

DASH is the Oracle Cloud solution for finance, human resources, payroll operations projects and facilities maintenance at the University of Tennessee. DASH brings core processes together within a single platform, strengthening operational efficiency and improving security, accessibility and sustainability.


This form is to be used for services requests if you cannot find an offering which fits.


If you could not find a service offering that fit the problem you would like to report, click here to start the process.


Get access to Creative Cloud Desktop apps like Photoshop, Acrobat, etc.


ITS reviews all hardware, software, and technical systems prior to their purchase to ensure they comply with the technical and cybersecurity standards of the University of Tennessee, UTHSC, and applicable government regulations. ITS also reviews products/services that are undergoing major architectural and platform changes (ex., a system moving from on-premise servers to the vendor's cloud).


If you are having issues accessing the network/internet, select Network Issue to report your problem.


ITS is happy to assist our customers with troubleshooting a wide range of applications on campus- or student-owned client devices


The Telecommunications team provides phone services for the UTHSC campuses in Memphis and Nashville, including phone number assignment/reassignment, "hard" desk phone installation and changes, call queues, call trees, old phone removal, service consultation, and more.


This describes the AI services provided for UT Heatlh Science Center Faculty, Staff and Students.


Use this form to request a NetID for a department or campus organization, or to make changes to an existing department or organization ID.


Is your computer, printer, scanner not working properly? Report your issue.


An e-signature or electronic signature is a legal way to get consent or approval on electronic documents or forms. It can replace a handwritten signature in virtually any process.


The Business Productivity Solutions team provides faculty, staff, and students training on desktop tools, with a focus on enhancing basic to advanced computer skills and desktop applications to make you more productive at work. Desktop Application Training is available for the Microsoft 365 suite of products, as well as FileMaker Pro, Qualtrics, Zoom and other tools supported by ITS.


This form is to request access to UTHSC's VPN for individuals not already assigned VPN access


Get UTHSC wireless access for a university authorized guest.


Banner is UTHSC’s student information system. Banner Dashboards and Reports are used to support the Registrar, Financial Aid, Admissions, Bursar’s Office, Colleges and Faculty. This allows for efficient viewing of Banner data for transactional, analytical and auditing purposes.


Receive assistance in determining hardware or software purchases to accomplish your task.


Use this service to request an exception to be able to forward your UTHSC email to a domain that is not currently on the list.


This is not something that any UTHSC faculty, staff or student needs to request. You already should have one. By logging in with your SSO into tennessee.zoom.us, you are accessing your UT Zoom Licensed (Pro) account. However, if you are not using Single Sign On or SSO to login, you will not see it.


Complete this form to request access to a co-worker's computer files, email, OneDrive, SharePoint or Zoom account, if the employee has left UTHSC or is on an extended absence. These requests require HR approval.


Teaching and Learning Center staff can provide advice on what technologies might be most appropriate to help instructors meet their learning goals, provide guidance on best practices with the use of academic technologies, and provide instruction to instructors and students on how to it.


Installation/configuration of approved software on UTHSC-owned and/or personally-owned computer equipment.


This form is used to request an exception or exemption to established UTHSC Information Technology and Office of Cybersecurity Policies and Standards