Your  Account:

Custom Computer Requests (Non-Refresh)

There may be occasions where ordering a computer from the campus standards may not meet the needs of a request.  In these circumstances, a custom configuration/computer may be required.  Due to the nature of these requests, a consultation/review is required as there are baseline requirements and vendor restrictions that must be considered.  Below are some examples of requests that may be considered for approval:

  • A local computer that is required for high-end graphical processing (GPU) or high-performance computer (HPC).
  • A local computer that is required to address unique storage or data analysis (disk, memory or processor requirements)
  • A local computer that accompanies a scientific instrument that is required for its operation.

Policy & Compliance Requirements for Computer Purchases

  • Computers and other technology must be purchased through an approved vendor that has an existing MEA or current contract with the CSU system.
  • Devices must adhere to CSU Information Security Policy, therefore, computer requests must meet the minimum standards outlined in the above policy (Business-class computers, Enterprise Management System (EMS) capable devices, encryption, security patching, and endpoint protection services).  For this reason, IITS recommends pre-vetted models to simplify the procurement process.
  • Software installations must be requested and completed by IITS.  Refer to Administrator Privileges site & Adjustments Page for additional policy information. 
  • All devices must include a warranty that runs through the campus lifecycle (4 years), and be under support by IITS per the above CSU configuration standards. Consult Support Costs & Details.
  • IITS will waive support costs if the purchase is intended for state-side faculty research (excluding grants and sponsored projects).
  • IITS is required by CSU policy to invoice for support costs if a project is funded by grant funds or is part of a sponsored project.
  • Once a computer reaches year 5 of its usable life, it must be evaluated for replacement or returned to IITS for erasure and recycling.  Removal from the campus network to extend the life of a computer requires review by the Campus Information Security Office.  This 5 year time period has been highlighted as this is the length of time in which aging computers are generally unable to receive critical security patches and operating system updates.

Request Process (start to finish)

For requests that do not yet have an official quote (no screenshots or consumer quotes), please contact Nicholas Duarte in IITS prior to submitting the form below.  If you already have a quote for an approved configuration from a campus vendor, proceed to step 1 below.  

  1. Please complete the technology order request form using the Custom Computer (non-refresh; requires special approval)  option listed on the form and include your approved vendor quote.
  2. IITS will review the submission, requiring up to 5 business days for approval. If the quote is approved, a contract will be routed to the respective Dean/AVP/VP for signature approval via AdobeSign.
  3. Once digitally signed/approved by the Dean/AVP/VP, purchasing steps will be provided to the requesting department. The requesting department is responsible for completing the purchase process, either by PO or Procard, when allowable.
  4. Once successfully ordered and then subsequently delivered to the campus, the computer will be inventoried by IITS. Please note that the inventory and configuration process require up to 5 business days before the device will be made available to the requesting individual.