Create an incident record using the available information about the incident. Include information provided by the
Requestor. Incidents may come from any process, but particularly from Request Fulfillment, Event Management, Security
Management, Change Management, and Service Execution.
The Requestor can be a User or a User proxy (such as a support person, a process or a tool) that identifies the
incident.
When an Incident is identified by a User, the initial User validation and service entitlement are done by the Request
Fulfilment process which manages the initial User contact with the Service Provider.
Log the incident even if it may be subsequently rejected. Log incident according to associated policies.
|