The post Academic Technology Equipment Event Request Form appeared first on Fairleigh Dickinson University | IT.
]]>The post Academic Technology Equipment Event Request Form appeared first on Fairleigh Dickinson University | IT.
]]>The post Accept a New Certificate for FDU-Secure Wireless Network appeared first on Fairleigh Dickinson University | IT.
]]>FDU-Secure uses current encryption standards to connect to the FDU wireless network via secure wireless traffic. This is an evolving technology and occasionally, one of the changes made by FDU IT requires us to issue a new certificate. When this occurs, you will need to accept the certificate using the process below.
Your process may vary slightly based on the version of the Operating System that your device is using.
If you have any questions or concerns, please visit SAMI Support, where you can request additional information or search our extensive IT knowledge base. While SAMISupport provides the quickest and easiest access for IT support, you can contact the SAMI Service Desk by phone (973)-443-8822 or email at [email protected].






The post Accept a New Certificate for FDU-Secure Wireless Network appeared first on Fairleigh Dickinson University | IT.
]]>The post Acceptable Use Policy for Computer Usage appeared first on Fairleigh Dickinson University | IT.
]]>Original Effective Date: 02/17/2013
Revised Date: 04/20/2023
The computing and electronic communications facilities at Fairleigh Dickinson University support the instructional, research, and administrative activities of the University. Users of these facilities may have access to University resources, sensitive data, and external networks. Consequently, it is imperative for all users to behave in a responsible, ethical, and legal manner. This document presents specific guidelines for appropriate behavior and use of FDU computing resources.
These guidelines apply to all users of FDU computing resources. Users include all students, faculty, staff, visiting faculty, volunteers, guests of the administration, and external individuals or organizations.
Computing resources include, but are not limited to, desktop and laptop computers, file servers, smart phones, email and electronic communications, software, University-assigned email accounts, data storage, and networking equipment used to link these components together and to the Internet, whether owned, leased, or licensed by FDU. In addition, computing resources include use of the University network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network. Moreover, this policy applies to all usage of university computing resources, whether that usage occurs through a university owned device or personal device.
University property, including computing resources, are provided to you for University business. Although security protocols have been put in place to restrict access to computing resources to protect them against unauthorized access by external parties, it is important that all members of the University community take appropriate measures to safeguard these resources.
Users – and not the University — are responsible for the materials that users prepare, receive, or transmit through computing resources. Thus, as a condition of using the University’s computer system, all users represent that they are in compliance with applicable laws and University policies, including l federal, state, and international copyright and other intellectual property laws and laws regarding defamation.
Those who make use of the FDU computing resources are required to behave in a manner consistent with FDU’s codes of conduct. As a user of this network, you agree to the following usage guidelines:
Computing resources are created to support the instructional, research, and administrative activities of the University, and are the property of the University. Personal use of the University’s computing resources, except for students enrolled at the University, should be incidental and kept to a minimum. Use of such resources by an employee for other than work-related matters should be reasonable and limited so that it does not prevent the employee from attending to and completing work effectively and efficiently, does not incur additional cost to the University, and does not preclude others with work-related needs from using the resources, including the shared campus and Internet bandwidth.
Department Heads and other administrators may enact additional restrictions to further limit employees’ personal use of University computing resources. These restrictions may include but are not limited to: limiting time spent reading or writing personal email or visiting web pages, and limitations on acceptable content due to the possible exposure of screens to other individuals. Human Resources must be consulted, in advance, about any proposed restrictions.
Users should use reasonable available methods to safeguard their data, including regular changes of passwords, and encrypting sensitive data. In the event that files have been corrupted as a result of intrusion, you should notify a system administrator immediately. Please note that FDU’s computing resources are not completely secure. It is possible that others will be able to access files by exploiting shortcomings in system security. For this and other reasons, FDU cannot assure confidentiality of files and other transmissions.
The Office of Information Resources and Technology (“OIRT”) and each of its departments attempt to provide reasonable security against damage to files stored on FDU’s computing resources by filtering all outgoing and incoming electronic mail for viruses and junk mail and making regular backups of systems.
In connection with the University’s migration to Office 365, the University adopted a policy of retaining copy of each fdu.edu email for three (3) years. This means, regardless of individual user action, the University will maintain a copy of all email traffic for a period of 3 years.
In the event of lost or damaged files, a reasonable attempt will be made to recover the information; however, the University and the University Information Technology staff cannot guarantee recovery of the data or loss of data due to media failure, floods, fires, etc.
OIRT and each of its departments will make reasonable attempts to provide error-free hardware and software on our computing resources, however, it is not possible to guarantee this, and information provided by staff members is not guaranteed to be correct.
Users should exercise caution when storing any confidential information in electronic format, because the privacy of such information cannot be guaranteed. User(s) must be aware that any personal files, including e-mail, maintained on University computing resources are University property and are subject to University storage, retrieval, and review. Individuals using FDU computing resources should have no expectation that any information transmitted through or stored on FDU computing resources, whether the information is contained on a computer hard drive, computer disks, University or third party server or in any other manner, will be private. By using FDU computing resources, the user consents to the University’s (and its designees’, both internal and external) access to their electronic files, documents, and materials stored, transmitted, or otherwise accessible on those resources.
Examples of where the University might access a user’s electronic files include system backups, which access all files in a user’s account; software upgrades which may require editing startup files in a user’s account; diagnostic and trouble-shooting activities, which may, for example, require viewing the address headers of e-mail messages to determine the cause of problems; keystroke monitoring of sessions to determine inappropriate use of the computing facilities; searches in connection with a litigation, threatened litigation, governmental proceeding or investigation; investigation of a possible data breach; investigation of possible breach of University policy, rules, handbooks, or protocols; and other measures to safeguard the University’s systems and compliance with laws. These examples are not intended to limit the University’s right to access a user’s electronic files under circumstances deemed appropriate by the University. In such situation(s), University computer resources in the possession of a user, or otherwise assigned to an individual, may be accessed, reviewed, duplicated, stored, and forwarded by appropriate personnel without the user’s permission or knowledge.
Without limitation, because employees are granted access to and use of FDU computing resources to conduct University business, the University reserves the right to access electronic mail messages left on or transmitted through the University’s computing resources. Employees should not assume that such messages are private and confidential or that the University or its designated representatives will not have a need to access and review this information.
The Family Education Rights and Privacy Act (FERPA) binds all users who have access to student data and this policy is subject to FERPA requirements. In general, FERPA gives students more control over their educational records, and it prohibits educational institutions from disclosing “personally identifiable information in education records” without the written consent of the student (subject to specified exceptions). To find out specifically what information you may or may not give out and to whom, contact the office of the Vice President for Student Affairs.
Policy violations should be reported immediately to any one of the individuals listed in Appendix 1.
Violations of this policy will be addressed as described in the Student, Faculty and/or Employee Handbooks, any relevant contracts, and, if applicable, State and Federal law or regulations. University students and employees who violate this Policy will be met with appropriate disciplinary action, up to and including dismissal, expulsion, or termination from the University. Third parties who violate this Policy may have their relationship with the University terminated and their access to campus restricted. In addition, a user’s system privileges can be suspended for a specified time period or revoked and/or a monetary fine may be imposed on those in violation to reimburse the University for the staff time and other costs of investigating and rectifying the violation.
The University reserves the right to suspend computing resource privileges while investigating a complaint or troubleshooting a system or network problem.
This policy is subject to revision. Comments and suggestions are welcome and should be sent to Stuart Alper, Associate Vice President of Systems and Networking, mailstop T-BH1-01, or [email protected].
It is the user’s responsibility to remain informed about the contents of this document.
Stuart Alper
Associate Vice President of Systems and Networking
Mailstop T-BH1-01
(201)-692-2414
[email protected]
Saul Kleinman
Associate Vice President of Management Information Systems
Mailstop T-BH2-03
(201)-692-2065
[email protected]
The post Acceptable Use Policy for Computer Usage appeared first on Fairleigh Dickinson University | IT.
]]>The post Accessing an FDU Email Account on a Mobile Device Using the Outlook App appeared first on Fairleigh Dickinson University | IT.
]]>The easiest way to access your FDU email account on your mobile device is to install the Outlook app from either the App Store (Apple) or the Play Store (Android). We support and advise using this method due to the program’s robustness and integration of all Office365 features. Follow the steps below to install and set up the Outlook app on your phone.








The post Accessing an FDU Email Account on a Mobile Device Using the Outlook App appeared first on Fairleigh Dickinson University | IT.
]]>The post ADA Compliance appeared first on Fairleigh Dickinson University | IT.
]]>Any videos distributed on various platforms by FDU must comply with federal regulations concerning accessibility for individuals who are deaf or hard of hearing. It’s essential to ensure that our content is accessible to all members of our community, in line with these important guidelines.
To read the Americans with Disabilities Act rules and regulations, visit the link below:
Americans with Disabilities Act
All video projects produced by Multimedia Services must be closed captioned and transcribed. Captions appear onscreen simultaneously with the audio and video and follows the same timing. It exists within the video player. A transcript is the same word-for-word content as captions, but presented in a separate document, whether it is a text file, word processing document, PDF, or web page.
The post ADA Compliance appeared first on Fairleigh Dickinson University | IT.
]]>The post Adding a FDU Email Account to a Mobile Device’s Native ‘Mail’ App appeared first on Fairleigh Dickinson University | IT.
]]>These instructions demonstrate adding an FDU email account to an Apple mobile device’s native Apple “Mail” app. Unfortunately, adding an FDU email account on an Android OS mobile device’s native “Mail” app is currently unsupported by FDU IT support. Information regarding adding an FDU email account to an Android OS mobile device via the Outlook App can be found below for Android OS mobile device users.
The easiest way to access your FDU email account on your mobile device is to install the Outlook app from either the App Store (Apple) or the Play Store (Android). FDU IT supports and advises using this method due to the program’s robustness and integration of all Microsoft 365 features. A link with instructions for the Outlook app on mobile devices can be found at the bottom of this page.











Due to the multiple Android OS mobile device manufacturers (Samsung, Google, or LG) each having their own native ‘Mail’ app, email setup and features differ depending on the manufacturer of the Android OS devices. For this reason, it is best practice to use the Microsoft ‘Outlook’ app found in the Google Play Store. Follow the instructions below to set up Outlook on Android OS.
The post Adding a FDU Email Account to a Mobile Device’s Native ‘Mail’ App appeared first on Fairleigh Dickinson University | IT.
]]>The post Advising Appointment Scheduling through MyFDUConnect appeared first on Fairleigh Dickinson University | IT.
]]>Follow these quick steps to access and use the tool:





The post Advising Appointment Scheduling through MyFDUConnect appeared first on Fairleigh Dickinson University | IT.
]]>The post Authorization for Turning in Desktop Request Form appeared first on Fairleigh Dickinson University | IT.
]]>The post Authorization, Authentication and Access Management Policy appeared first on Fairleigh Dickinson University | IT.
]]>Revision Date: New Policy
Effective Date: 11/1/2023
I. Purpose
The purpose of this policy is to establish information security standards for individuals receiving credentials to Fairleigh Dickinson University (“FDU” or “University”) resources and how those resources are accessed.
II. Scope and Applicability
This policy applies to all university system resources. All Users are responsible for adhering to this policy.
III. Definitions
Capitalized terms shall have the meaning ascribed to them herein and shall have the same meaning when used in the singular or plural form or any appropriate tense.
IV. Authentication
VI. Enforcement
VII. Exceptions
The post Authorization, Authentication and Access Management Policy appeared first on Fairleigh Dickinson University | IT.
]]>The post Availability and Use of Google Apps appeared first on Fairleigh Dickinson University | IT.
]]>Effective Date: April 1st, 2021
Fairleigh Dickinson University (FDU) has adopted and standardized use of the Microsoft Office 365 Suite of products for University business. Some external entities, however, that conduct business with University employees utilize the Google Suite of products. This policy stipulates which Google applications will be made available to faculty and staff (not students) to enable collaboration with these external entities to conduct University business.
Fairleigh Dickinson University (FDU) has adopted and standardized use of the Microsoft Office 365 Suite of products for University business. However, it is recognized that not all entities use Microsoft Office 365 as their platform and, from time to time, FDU faculty and staff may need the ability to collaborate with external entities that may be using the Google Suite of products. This policy stipulates which Google applications will be made available to faculty and staff to enable collaboration with these external entities.
This policy applies to all FDU faculty and staff, wherever located throughout the world. Students will NOT have access to the fdu.edu Google Apps suite of products.
The University has designated the Chief Information Security Officer, working together with the Data Security Information Response Team (DSIRT) and the USAN Director of Systems, to implement, supervise and maintain this Policy.
To combat internal risks to the security, confidentiality, and integrity of any electronic, paper or other records, adherence to this Policy and the WISP will be strictly enforced.
To combat external internal risks to the security, confidentiality, and integrity of any electronic, paper or other records, adherence to this policy and the WISP will be strictly enforced.
Questions regarding the availability of Google Apps can be directed to the SAMI Support Desk.
Please note that the UTAC is not able to provide application support on the Google suite of products.
Requests for exceptions to this Policy should be directed in writing to the Chief Information Security Officer via the SAMI Support Desk.
These applications may only be used in collaboration with outside entities who use Google applications as their sole source of collaboration and request the use of any one of these application for official FDU business use. Any other use of these applications by FDU faculty and staff is a violation of this Policy.
| Services | Descriptions |
|---|---|
| Assignments | Assignments brings together the capabilities of Google Docs, Drive and Search into a tool for collecting and grading student work. |
| Calendar | Google Calendar is a web-based tool for personal scheduling and calendar sharing. It can be accessed through either a Web browser or through a third-party calendar client. |
| Classroom | Google Classroom enables teachers to create an online classroom area in which they can manage all the documents that their students need. |
| Drive and Docs | Google Docs is an online word processor that lets you create and format text documents and collaborate with other people in real time. Google Drive on the web lets you store, access, and edit your files anywhere — on the web, on your hard drive, or on the go. |
| Google Meet | Google Meet enables conversations with photos, emoji, group video calls for free. You can connect across computers, Android and Apple devices. |
| Google Vault | Vault is an information governance and eDiscovery tool for Google Workspace. With Vault, you can retain, hold, search, and export users’ Google Workspace data. |
| Groups for Business | Google Groups for Business is an extended service available for G Suite users that allows you and other members in your organization to access the main Google Groups interface located at groups.google.com. |
| Jamboard | Google Jamboard is an online, collaborative whiteboarding application that lets you create, edit, and collaborate with other people in real time. Google Jamboard applications can be accessed on the Web, Android, and iOS. |
| Keep | Google Keep is a note-taking service included as part of the free, web-based Google Docs Editors suite offered by Google |
| Tasks | Google Tasks is a simple to-do list—but with lists, subtasks, and mobile notifications, it has the basics you need to stay productive and keep track of the most important things you need to do. |
| Applied Digital Skills | Applied Digital Skills is a free, flexible video-based curriculum that prepares students for the growing number of jobs that require basic digital skills, such as email and spreadsheets. |
| Google Ad Manager | Google Ad Manager is an ad exchange platform introduced by Google on June 27, 2018. It combines the features of two former services from Google’s DoubleClick subsidiary, DoubleClick for Publishers and DoubleClick Ad Exchange. |
| Google Ads | Google Ads is Google’s online advertising program. Through Google Ads, you can create online ads to reach people exactly when they’re interested in the products and services that you offer |
| Google AdSense | Google AdSense is an advertising program launched by Google in 2003 that allows website publishers to display targeted text, video, or image advertisements on website pages. |
| Google Alerts | Google Alerts is a tool that allows you to track your chosen keywords and phrases so that you never miss another important conversation. |
| Google Analytics | Google Analytics generates detailed statistics about a website’s traffic and traffic sources and measures conversions and sales |
| Google Cloud Platform | Google Cloud Platform is a suite of public cloud computing services offered by Google. The platform includes a range of hosted services for compute, storage and application development that run on Google hardware. |
| Google Cloud Print | Google Cloud Print is a web service offered by Google. Users associate printers with their Google Account. |
| Google Data Studio | Data Studio is Google’s reporting solution for power users who want to go beyond the data and dashboards of Google Analytics. |
| Google Earth | Google Earth is the most photorealistic, digital version of our planet. |
| Google My Maps | Google My Maps is your way to keep track of the places that matter to you. |
| Google Payments | Google Pay (stylized as G Pay; formerly Pay with Google and Android Pay) is a digital wallet platform and online payment system developed by Google to power in-app and tap-to-pay purchases on mobile devices, enabling users to make payments with Android phones, tablets or watches. |
| Google Play | In Google Play, the app description is split into two fields: Short Description, a limited 80 characters preview field and. the Full Description field, giving you space for an up to 4000 characters long app description. |
| Google Play Console | Google App Store |
| Google Search Console | The Search Console lets you, as a webmaster, check on the status of the indexing Google does on your site, helping you to optimize your page visibility in Google search results. Get data, tools and diagnostics for a healthy, Google-friendly site. |
| Google Takeout | Google Takeout is a service that allows users of Google products, such as YouTube, Gmail, etc., to export their data to a downloadable ZIP file. |
| Managed Google Play | Managed Google Play Managed Google Play is a version of Google Play that’s optimized for enterprises. |
| Material Gallery | Material Gallery is a collaborative tool for uploading design work, getting feedback, and tracking revisions – quickly and efficiently. |
| Partner Dash | Partner Dash is a service that hosts several applications used by Google’s partners to manage their relationships with us. Some of these applications are invite-only, while others are publicly available to anyone logged in with a Google Account. |
| Scholar Profiles | The Google Scholar Profile search pane in Publish or Perish allows you to look up a Google Scholar profile and analyze the associated publication metrics. |
| Search And Assistant | Google Assistant is Google’s artificial intelligence-powered voice assistant, which grew out of Google Now. |
The post Availability and Use of Google Apps appeared first on Fairleigh Dickinson University | IT.
]]>