Search Results

Cisco Unified Communications Call Forward

Resources for: Faculty Staff
icon Close

NOTE: This article applies to NJ Campuses Only

With Cisco Unified Communications call forwarding, you have the ability to forward all of your incoming calls to another phone number. This can be useful in the event that you need to work from home or temporarily work from a different office.

Enabling Call Forwarding On-site

  1. To activate call forwarding, press “Forward All” while the phone is still on the hook
  2. To forward off campus, enter 3 then 1 and the 10-digit number.
    Example: (3 1 201 555 1212)
  3. To forward on campus, enter the 4-digit campus extension
    Example: (5555) 
  4. A message will briefly appear on your phone’s screen to let you know that calls are now being forwarded
  5. With forwarding enabled, the onscreen “Forward All” button will now read as “Forward Off

NOTE: To Disable Call Forwarding simply press this “Forward Off” button when you are ready to deactivate the feature.

The call forwarding process is also explained in your phone’s Quick Reference Guide.

This short and easy to use document explains many essential UC features including conference calls, call transferring and voicemail.

As always, please contact our University Technical Assistance Center at (973)-443-8822 if you have any questions.

Enabling Call Forwarding Offsite

If you are unable to be by your FDU phone, and you need to set up Call Forwarding, you can do this through our Self-Service portal.

  1. You must have an NWN Cloud Self-Service account in order to modify your preferences. If you have one already, proceed to step 3 otherwise continue to step 2
  2. Call UTAC at (973)-443-8822 and let them know you are accessing your NWN Cloud Self-Service portal for the first time. UTAC will provide you a temporary password for logging in the first time
  3. Visit the self-service portal at fdu-selfcare.nwncloud.com
  4. Enter your full NETID@fdu.edu in the login field. Example: (SmithR@fdu.edu)
  5. Enter your NWN Cloud account password and click “Enter
  6. Next click on your Name on the top right of the screen. Hover over the drop-down menu and click “My Account
  1. Under “Web Password” un-click the checkbox to set a custom password. When done, click “Apply” in the top right corner
  1. Once logged in, click “My Call Forwards
  1. Input the phone number you wish to forward to then click “Apply“ 
    • To forward off campus, enter 3 then 1 and the 10-digit number.
      Example: (3 1 201 555 1212)
    • To forward on campus, enter the 4-digit campus extension
      Example: (5555) 

NOTE: If you have more than one internal number, click on the extension you wish to forward.

NOTE: If you need to use your personal cell phone to make a call from a remote site, and you do not wish to reveal your Caller ID, simply prepend the phone number to be dialed with *67.  Example: *672015551212.  Your phone number will not appear to the phone of the person dialed.

If, at any time, this function does not work, or you can not access the nwncloud portal, please call UTAC at (973)-443-8822 or open a ticket for Voice Services.

Last Modified: March 20, 2020 icon icon Copy Link

Cisco Unified Communications Jabber Softphone Installation

Resources for: Faculty Staff
icon Close

NOTE: This article applies to NJ Campuses Only

Installing Cisco Jabber Softphone

When you are out of the office, a softphone on your computer can be used to make and receive calls from your campus phone number.

  1. You must have an active NWN Cloud Self-Service account in order to use the Cisco Jabber Softphone. If you have one already, proceed to step 3 otherwise continue to step 2
  2. Call UTAC at (973)-443-8822 and let them know you are accessing your NWN Cloud Self-Service portal for the first time. UTAC will provide you a temporary password for logging in the first time
  3. Visit the self-service portal at fdu-selfcare.nwncloud.com
  4. Enter your full NETID@fdu.edu in the login field. Example: (SmithR@fdu.edu)
  5. Enter your NWN Cloud account password and click “Enter
  6. Click and download Jabber for Windows or macOS, located within the links sections.
  1. Each Jabber link will send you to a webpage to download the latest Cisco Jabber software. Choose download at the top right and wait for it to start

NOTE: There is no need to login again if you are prompted, the download will begin shortly.

  1. Install the Jabber Software

Windows

  • For Windows, double click the downloaded CiscoJabber.ZIP file and double click on the Setup file to start the installation. Click “Yes” to accept and install the software. Once complete, the Cisco Jabber Software will start and it will have created a shortcut in your Programs Folder



NOTE: If you are prompted for an administrative account, and the installation will not proceed, call UTAC and they will be able to assist you through this step.

macOS

  • For Mac, double click the downloaded CiscoJabber.PKG and proceed through the installation.

The Cisco Jabber Software will be available under your Applications folder.

  1. Start Cisco Jabber and enter your username, which is your full NETID@fdu.edu in the login field and click continue. Example: (SmithR@fdu.edu)
  1. Enter your NWN self-service portal password and click Sign In
  1.  The Cisco Jabber client installation is now complete.
Last Modified: May 28, 2020 icon icon Copy Link

FDU has a number of technology enhanced classrooms that are capable of video/computer projection.

To find out if your classroom is on this list please click the link for your campus:

To reach the help desk call (973)-443-8822 or via Email at fdutac@fdu.edu

Metropolitan Campus Technology Chart

NOTE: Scroll left to right on the chart if viewing on a Mobile device or in Desktop preview mode. To view the full chart, rotate your Mobile device into landscape mode. On Desktop, press the full screen button (icon with expanding arrows inside of a circle) on the top right of the article header.

Building NameProjector Enabled RoomsDVD/VCR Combo RoomsSpeaker EnabledEcho 360HDMI JackSmartboard
Becton Hall202YesYes Laser 
Becton Hall205Yes Yes Laser 
Becton Hall208YesYes Laser 
Becton Hall302Only DVD Yes YesYes
Becton Hall304Only DVD Yes YesYes
Becton Hall305 Yes Yes 
Becton Hall306 Yes Yes 
Becton Hall402 Yes Laser 
Becton Hall403/404 (LED Screen)Yes Yes YesYes
Becton Hall405 Yes Laser 
Becton Hall406 Yes Laser 
Becton Hall407 Yes Laser 
Becton Hall408 Yes Laser 
Becton Hall Conference Room307     
Dickinson Hall1104YesYes Laser 
Dickinson Hall1128YesYes Yes 
Dickinson Hall1129YesYes Yes 
Dickinson Hall1142YesYes Laser 
Dickinson Hall1143Yes Yes Yes 
Dickinson Hall1144Yes Yes Laser 
Dickinson Hall1148 Yes   
Dickinson Hall1149YesYes Yes 
Dickinson Hall1150YesYes Yes 
Dickinson Hall1151YesYes Laser 
Dickinson Hall1152 (LED Television)YesYes Yes 
Dickinson Hall1153 (LED Televison)YesYes Yes 
Dickinson Hall1165 (LED Televison)YesYes Yes 
Dickinson Hall1170 (LED Television)YesYes Yes 
Dickinson Hall2135YesYesYesLaser 
Dickinson Hall2137Yes Yes Yes 
Dickinson Hall2177YesYes Yes 
Dickinson Hall2178YesYesYesLaserYes
Dickinson Hall2230Yes Yes Laser 
Dickinson Hall2249 Yes YesYes
Dickinson Hall2262Individual DVD & VCR Yes   
Dickinson Hall2263 Yes Laser 
Dickinson Hall4468YesYes Yes 
Dickinson Hall4469YesYes Laser 
Dickinson Hall4473YesYes Laser 
Dickinson Hall4475Yes Yes Laser 
Dickinson Hall5504YesYes Laser 
Dickinson Hall5506YesYes Laser 
Dickinson Hall5509   Laser 
Dickinson Hall5520 Yes Yes 
Dickinson Hall5523 Yes Yes 
Dickinson Hall5529YesYes Laser 
Dickinson Hall5534YesYes Laser 
Dickinson Hall – Conference Room1191   Laser 
Dickinson Hall – Conference Room2245 YesYesLaser 
Dickinson Hall – Continuing Education1127YesYes Laser 
Dickinson Hall (Lab A)2163 Yes Yes 
Dickinson Hall (Lab B)2164 Yes Yes 
Edward Williams Building201 Yes Yes 
Edward Williams Building202 Yes Yes 
Edward Williams Building203 Yes   
Edward Williams Building204 YesYes Yes 
Edward Williams Building205 Yes Laser 
Edward Williams Building206 Yes Laser 
Edward Williams Building207 Yes Yes 
Edward Williams Building209 Yes Laser 
Edward Williams Building301 Yes Laser 
Edward Williams Building302 Yes Laser 
Edward Williams Building303 Yes Laser 
Edward Williams Building304 Yes Laser 
Edward Williams Building305 Yes Laser 
Edward Williams Building306 Yes Laser 
Edward Williams Building308 Yes Laser 
Edward Williams Building309 Yes Laser 
Edward Williams BuildingCommons 1YesYes Laser 
Edward Williams BuildingCommons 2YesYes Laser 
Edward Williams BuildingAuditoriumYesYes Laser 
Giovatto LibraryWriting Lab Yes Laser 
Giovatto LibraryWLB 3YesYes Laser 
Giovatto LibraryWLB 4YesYes Laser 
Giovatto LibraryAuditoriumYesYes   
Giovatto LibraryWLB 1 (LED Screen)YesYes (TV Speakers)   
Giovatto LibraryWLB2 (LED Screen)YesYes (TV Speakers)   
Multipurpose RoomYesYesYes Laser 
Muscarelle105Yes Yes Laser 
Muscarelle202YesYes    
Muscarelle203Yes  Yes Laser 
Muscarelle204 Yes Laser 
Muscarelle205YesYes Yes 
Muscarelle206Yes Yes  Yes 
Muscarelle207L Yes Laser 
Muscarelle207RYesYes  Yes 
Robison Annex100Yes Yes Yes 
Robison Annex101YesYes Yes 
Robison Annex203Yes Yes Yes 
Robison Annex204YesYes Yes 
Robison Annex205Yes Yes Laser 
Robison Annex300 Yes Laser 
Robison Annex301 Yes Yes 
Robison Annex303 Yes Laser 
Robison Annex304YesYes Laser 
Robison Annex305 Yes Laser 
Robison Hall23BYesYes Laser 
Robison Hall501     
Robison Hall503     
Rutherford RoomYesYesYes Laser 
Universit Hall TheatreLED ScreenYes    
University Hall12 Yes   
University Hall22 Yes   
University HallMultimedia Lab YesYes    
Williams Hall  Yes   
Williams Hall102YesYes Laser 
Williams Hall107YesYes Laser 
Williams Hall201 Yes Laser 
Williams Hall202 Yes Laser 
Williams Hall203 Yes Laser 
Williams Hall206  Yes Laser 
Williams Hall207  Yes Yes 
Wilson AuditoriumYesYesYes Laser 

Florham Campus Technology Chart

NOTE: Scroll left to right on the chart if viewing on a Mobile device or in Desktop preview mode. To view the full chart, rotate your Mobile device into landscape mode. On Desktop, press the full screen button (icon with expanding arrows inside of a circle) on the top right of the article header.

Building NameProjector Enabled RoomsDVD/VCR Combo RoomsSpeaker EnabledEcho 360HDMI JackSmartboard
Dreyfuss Building102YesYes Laser 
Dreyfuss Building103YesYes Laser 
Dreyfuss Building104YesYes Laser 
Dreyfuss Building105YesYes Laser 
Dreyfuss Building106YesYes Laser 
Dreyfuss Building107YesYes Laser 
Dreyfuss Building121Yes  Laser 
Dreyfuss Building125YesYes  Laser 
Dreyfuss Building206 Yes Yes 
Dreyfuss Building207 Yes Yes 
Dreyfuss Building208 Yes Yes 
Dreyfuss Building210 Yes Yes 
Dreyfuss Building211     
Dreyfuss Building212     
Dreyfuss Building213     
Dreyfuss BuildingTheater     
Hennessey Room 1Yes Yes  Yes
Hennessey Room 2Yes Yes  Yes
LibraryLibrary ClassroomYes Yes  Laser 
Mansion11YesYes Laser 
Mansion12Yes Yes Laser 
Mansion13YesYes Laser 
Mansion17Yes Yes Laser 
Mansion30Yes Yes Laser 
Mansion33Yes Yes Yes 
Mansion35Yes Yes Laser 
Mansion36YesYes Yes 
Mansion38YesYes Laser 
Moninger 105 Just DVDYesYesYesYes
Moninger 106 Just DVDYesYesYesYes
Moninger 107YesJust DVDYes Laser 
Moninger 113Yes Yes Yes 
Moninger 118 Just DVDYesYesLCD ScreenYes
Moninger 119 Just DVDYesYesLCD ScreenYes
Moninger 205    Yes 
Moninger 206    Yes 
Moninger 210    Yes 
OrangerieYes Yes Yes 
Science Building1 Yes Yes 
Science Building3   Yes 
Science Building6   Yes 
Science Building7Yes Yes Yes 
Science Building9 Yes Yes 
Science Building11Yes Yes Laser 
Science Building15A Yes Yes 
Science Building17YesYes Yes 
Science Building18 Yes Yes 
Science Building19 Yes Laser 
Student CenterSammartino RoomYes Yes Yes 
Student CenterFlorham RoomYes Yes Yes 
Student CenterWroxton RoomYesYes   
Student CenterBottle Hill Room     
Twombly LoungeYesYesYes Laser 
Zen Building102YesYes Yes 
Zen Building103YesYes Yes 
Zen Building104YesYes LCD Panel 
Zen Building105YesYes   
Zen Building106YesYes   
Zen Building107YesYes Yes 
Zen Building108YesYes Yes 
Zen Building109YesYes Yes 
Zen Building110DVD onlyYes LCD PanelYes
Zen Building202YesYes Yes 
Zen Building203YesYes Yes 
Zen Building204Yes Yes Yes 
Zen Building205YesYes Yes 
Zen Building206YesYes LCD Panel 
Zen Building207Yes Yes Yes 
Zen Building208DVD onlyYes LCD PanelYes
Zen Building209YesYes Yes 
Zen Building210   Laser 
Zen Building211 YesYes Yes 
Zen Building212 YesYes Yes 
Last Modified: March 11, 2020 icon icon Copy Link

Select employees of Fairleigh Dickinson University may be required to engage with confidential University data.

The FDU Confidentiality Agreement and Security Policy defines your obligations under Federal and State guidelines to preserve the security and confidentiality of this information.

Confidentiality Agreement and Security Policy

Fairleigh Dickinson University regards security and confidentiality of data and information to be of utmost importance. Each individual granted access to electronic and/or hard copy data holds a position of trust and must preserve the security and confidentiality of the information to which he/she is granted access to. Therefore, it is the intent of this policy to ensure that University data, in any format, is not divulged outside of Fairleigh Dickinson University without explicit approval to do so by an Associate Vice-President of the University or higher who has responsibility for the data in question. As such, the University requires all users of data to follow the procedures outlined below:

Policy on Confidential Information

Users of University data are required to abide by all applicable Federal and State guidelines and University policies regarding confidentiality of data, including, but not limited to the Family Education Rights and Privacy Act (FERPA); Gramm Leach Bliley (GLB); and The Health Insurance Portability and Accountability Act of 1996 (HIPAA). All users of University data and information must read and understand how the FERPA, GLB and HIPPA policies apply to the confidential information they are accessing (a brief summary of this legislation may be found at here. All users with access to Datatel or other university computer systems acknowledge that they have read and agree to abide by the University’s Acceptable Use Policy found at it.fdu.edu under the Policies.

Confidential Information shall be defined as:

  • regarding student, faculty or staff: any personally-identifiable records, financial records (including social security and credit card numbers), health records; contracts, research data; alumni and donor records; personnel records other than an individual’s own personnel record;
  • regarding the University: University financial data; computer and system passwords, University issued PINS, University proprietary information/data; and 
  • any other information for which access, use, or disclosure is not authorized by: 1) federal, state, or local law; or 2) University policy.

The individual receiving the Confidential Information shall have no obligation under this Policy with respect to Confidential Information which:

  • is or becomes publicly available without breach of this Policy by the recipient; 
  • is rightfully received by the recipient without obligations of confidentiality; or 
  • is developed by the recipient without breach of this Policy; provided, however, such Confidential Information shall not be disclosed until thirty (30) days after written notice of intent to disclose is given to the University officer who has responsibility for the data in question, along with the asserted grounds for disclosure;
  • is disclosed in accordance with any “whistle blower” action as provided in the U.S. False Claims Act, or the New Jersey Conscientious Employee Protection Act, or similar legislation (Brief overviews of these statutes may be downloaded below)

Any individual with authorized access to the Confidential Information is given access solely for the business of the University and must not divulge the Confidential Information outside of the University except for University business requirements approved by the President of the University or the division head responsible for the data in question. Specifically, with respect to Confidential Information, individuals must:

  1. Access Confidential Information solely in order to perform his/her job responsibilities.
  2. Not seek personal benefit or permit others to benefit personally from any Confidential Information that has come to them throughout their work assignments.
  3. Not make or permit unauthorized use of any Confidential Information in the University’s information system or other records.
  4. Not enter, change, delete or add data to any information system or files outside of the scope of their job responsibilities.
  5. Not include or cause to be included in any record or report, a false, inaccurate or misleading entry known to the user as such.
  6. Not alter or delete or cause to be altered or deleted from any records, report or information system, a true and correct entry.
  7. Not release Confidential Information other than what is required in completion of job responsibilities which is consistent with this Policy.
  8. Not exhibit or divulge the contents of any record, file or information system to any person unless it is necessary for the completion of their job responsibilities.

It is the individual’s responsibility to immediately report, as outlined under “Information Security Breech and Violation Reporting” at the end of this Policy, if the individual has violated this Policy. Additionally, given the potential harm that the University may suffer with the release of any Confidential Information, all employees are strongly encouraged to report any suspected violation of this policy or any other action, which violates confidentiality of data, as outlined at the end of this policy.

Security Measures and Procedures

All users of University information systems, including Datatel, Novell and FDU email accounts, are supplied with an individual user account to access the data or systems necessary for the completion of their job responsibilities. Users of the University information systems are required to follow the procedures outlined below:

  1. All transactions, processed by a user ID and password, or PIN, are the responsibility of the person to whom the user ID was assigned. The user’s ID, password, and PIN must remain confidential and must not be shared with anyone.
    • Using someone else’s user ID, password or PIN is a violation of policy, no matter how it was obtained.
    • Your user ID, password or PIN provides access to information that has been granted specifically to you. To reduce the risk of shared passwords – remember not to post your password or PIN on or near your workstation or share your password or PIN with anyone.
    • All University computer systems will periodically prompt you to change your password.

      Note: If you need your Password or PIN changed, please contact the University Technical Assistance Center (UTAC) (973)-443-UTAC immediately.

  2. Access to any student or employee information (in any format) is to be determined based on specific job requirements. The appropriate Department Chair, School Director, Department Director/Manager, Dean, Provost, and/or Vice President is responsible for ensuring that access is granted only to authorized individuals, based on their job responsibilities. Written authorization must be received by the Computer Center prior to granting system access.

    You are prohibited from viewing or accessing additional information (in any format) unless you have been authorized to do so. Any access obtained without written authorization is considered unauthorized access.

    In order to prevent unauthorized use, the user shall log off of all applications that provide access to confidential information, or lock their computer when leaving their workstation. This is especially important during breaks and lunch. Unless there is a specific business need, all workstations should be shut down at the end of the workday. 

    Note: If you require assistance in establishing your workstation password, please access the screensaver documentation or contact the University Technical Assistance Center (UTAC) at 973-443-UTAC.

  3. If you have any reason to believe your password or PIN has been compromised or revealed inadvertently, you should change your password and immediately notify one of the individuals as outlined under “Information Security Breech and Violation Reporting” at the end of this policy. 

    Note: all University’s computer system will periodically prompt you to change your password.

  4. Upon termination or transfer of an employee, Human Resources will notify University Systems and Networking, who in turn will notify the appropriate areas in the Computer Center.
  5. Generally, students, temporary employees and consultants should not have access to the University record system. Written approval by the Department Chair, School Director, Department Director/Manager, Dean, Provost, and/or Vice President in charge of the respective area is required if it is determined that access is required. The student, temporary employee or consultant is to be held to the same standards as all University employees, and must be made aware of their responsibilities to protect student and employee privacy rights and data integrity. Written authorization must be received by the Computer Center prior to granting system access.
  6. You agree to properly secure and dispose of any outputs or files you create in a manner that fully protects the Confidential Information.

Additionally, I understand that if granted access to process transactions via Datatel data entry screens, any information I enter or change will be effective immediately. Accordingly, I understand that I am responsible for any changes made using my ID. 

I understand that my access to University data is for the sole purpose of carrying out my job responsibilities and Confidential Information is not to be divulged outside of The University, except as previously stated. Breach of confidentiality, including aiding, abetting, or acting in conspiracy with any other person to violate any part of this policy, may result in sanctions, civil or criminal prosecution and penalties, employment and/or University disciplinary action, and could lead to dismissal, suspension or revocation of all access privileges. I understand that misuse of University data and any violation of this policy or the FERPA, HIPAA or GLB policies are grounds for disciplinary action, up to and including dismissal. This Agreement shall not abridge nor supersede any rights afforded faculty members under the Faculty Handbook.

Information Security Breech and/or Policy Violation Reporting

If you suspect an Information Security Data Breech or a violation of this policy, report such an event to your department chair or staff supervisor and send an immediate email to violation@fdu.edu. If you do not have immediate access to email, contact the University Technical Assistance Center (UTAC) at 973-443-8822; do not provide details but request a ticket be opened with University Systems & Security due to a information security data breech or policy violation requesting an immediate callback. When practical, also send an email to violation@fdu.edu.

Last Modified: March 11, 2020 icon icon Copy Link

Requesting a New Temporary Password

Please contact the Help Desk at 973-443-8822 or email them at fdutac@fdu.edu to get a new temporary password.  After you login with your temporary password into the development account, you will be prompted to change your password. Please change your password in the development account, then logout of development. Login to the production account with the new password that you just created to do your work. Do not use the development account for your work. That account is only meant for testing purposes.

Rules for Creating a New Password

Rules for creating a password for Colleague WebUI:

  • Needs at least 8 characters.
  • There are four (4) character sets: Numbers, Uppercase Letters, Lowercase Letters and Special Characters – you need to have at least one of each type.
  • The Special Characters you can use are:   ! @ # $ % *       These symbols are above the number keys 1-5 and 8 on the keyboard.
  • You may not use any string from your name or login ID.  So, if your name is Mary – mar or ary would not be valid.
  • If you have had an account already, your password must be sufficiently different from previous passwords.
  • Helpful hints:  Be creative. If you want to use strings of words try substituting numbers and special characters for letters:  J@nu@ry1  would be a good password.  So would D!ck!n$0n 

This way you can cover all the rules.

Login with your temporary password into the development account, you will be prompted to change your password. Please change your password in the development account, then logout of development.  Login to the production account with the new password you just created to do your work.  Do not use the development account for your work.  That account is only meant for testing purposes.

Last Modified: March 11, 2020 icon icon Copy Link

FDU TAC

The Fairleigh Dickinson University Technical Assistance Center (UTAC) is the university technical help desk support organization. Fairleigh Dickinson University students, faculty, and staff must contact the UTAC to initiate support requests for commercial application software, desktop environments and peripherals, network connectivity, computer password maintenance (i.e. Webmail), hardware and software configuration support, other computer related product and service issues, Blackboard, classroom projector problems, and cable TV repair requests.

To contact the UTAC call (973)-443-8822.

Last Modified: March 11, 2020 icon icon Copy Link

How to access your Home Drive or Department Shared Drive Off Campus

Resources for: Faculty Staff
icon Close

The ability to access a home drive or department shared drive remotely is only supported for FDU-owned equipment.

First you need to ensure you have launched your Virtual Private Network (VPN) and logged in using your NetID and password.

Instructions for logging into the VPN

Windows

  1. Once you have connected via the VPN, open your File Explorer.
File Explorer Icon
Windows File Explorer Icon
  1. Halfway down the left panel, click on “This PC“. Your available Network Locations will appear in the center of the screen.
  1. To access any of your drives, simply double click on the icon next to Drive description.

NOTE: If you see a red X on the drive icon, please ensure you have successfully logged into the VPN.  If so, click on the red X and your drive should appear and the red X will go away.

Mac

  1. Go to your Finder app
Finder App Icon
  1. On the menu bar on top, click “Go” and select the last option “Connect to Server…” or alternatively on your keyboard press and hold “command” then press “K
  1. In the Connect to Server window enter SMB:// followed by the path of your network share

In the case of your home drive this will follow the convention of:

  • smb://root.fdu.edu/shares/users-madison/your NetID for Florham users
  • smb://root.fdu.edu/shares/users-metro/your NetID for Metro users

Pressing the “+” will add this to your list of Favorite Servers.

If you do not see your drives, please call UTAC at (973)-443-8822.

Last Modified: March 12, 2020 icon icon Copy Link

Changing a NetID Password OFF CAMPUS

Note:  It is best to change your password while on campus.  If you are off campus, please start with the following:

  1. Log into your computer
  2. Launch the Cisco AnyConnect Secure Mobility Client VPN or “FDU VPN” software and connect to FDU’s VPN Service. If you need to install the “FDU VPN or need instructions on how to launch the VPN Client, please follow the link for “FDU VPN Client” for instructions before proceeding.
  1. Once you are connected to the “FDU VPN” please follow the steps for “Preferred Method of Changing Your FDU NET ID password.” The “FDU VPN” allows for the user’s machine to perform tasks, such as changing you FDU NetID password, as if they were physically on campus.

Note: You will not be disconnected from FDU VPN after performing the password change. 

Changing a NetID Password ON CAMPUS (Preferred Method)

  1. On FDU issued laptops, desktops, and lab machines the password can be changed by pressing the Ctrl+Alt+Del button combination on the keyboard from any screen and selecting “Change a Password”.
  • Note: You must already be logged into the machine when performing the password change process.
  1. Now enter the following:
    • Your old or current password
    • Type in a new password
  • Note: Use 8 to 16 characters for your new password. Passwords must include all of the following 4 character types: Upper case letters, lower case letters, numbers, and special characters. Allowed special characters are: ! # $ @ _ + , ? [ ] . – ) ( ` ~ % ^ & * = { } | : ? , / and a dot. Please refrain from using portions of your name or email address within the password. Please refrain from using a password that you have already used.
    • Retype the new password to confirm
    • Press the right arrow button to continue
  1. Once this has been done, you must lock and unlock the machine once to complete updating your password:
    • Press ‘Ctrl+Alt+Del’ keys combination again
    • Click “Lock Computer”
    • Then log back in with your new password
  1. Your password should now be changed successfully
  • Note: Your new password will need to be updated in all web browsers with saved passwords and email clients across all devices. Examples include faculty and staff e-mail accounts synched to their iPad, iPhone, and or Android device. FDU-Secure Wi-Fi network access is also attached to your FDU NetID username and password and will need to be updated on devices that use it.

Changing your NetID Password with Web Portal Access

Employees who have an FDU issued Mac Desktop or MacBook laptop, adjunct professors, students, and anyone with personal laptop / desktop / tablet devices will use the Web Portal to change their NetID password.

Note: FDU Faculty and Staff issued Apple products utilizing Mac OS will use this as their primary way of changing their password whether ON or OFF campus. 

If the user has an FDU issued or owned Microsoft Windows-based machine, they should always follow the procedure in “Changing a NetID Password OFF CAMPUS” or “Preferred Method of Changing Your NETID password.”  Changing your FDU NetID through the Web Portal Access Page while having an FDU issued or owned Microsoft Windows based machines could cause temporary account lockouts and should only be used as a last resort. If lockout issues occur, please open up a service request with UTAC at x8822 and they will be dealt with promptly.

  1. Open a web browser (e.g., Google Chrome, Mozilla Firefox, Internet Explorer, Safari) and navigate to identity.fdu.edu. Click on “Account Maintenance” on the top right hand of the web page.
  1. Enter your current FDU NetID username and password in the corresponding text boxes and click “submit.”
  1. Under Sign-In and Security, select “Change My Password”
  • Note: Use 8 to 16 characters for your new password. Passwords must include all of the following 4 character types: Upper case letters, lower case letters, numbers, and special characters. Allowed special characters are: ! # $ @ _ + , ? [ ] . – ) ( ` ~ % ^ & * = { } | : ? , / and a dot. Please refrain from using portions of your name or email address within the password. Please refrain from using password that you have already used.
    • Enter your current password
    • Enter a new password
    • Retype your new password to confirm
    • When finished press “Change My Password”
    • A success message will be displayed if your NetID was successfully changed.

Sophos Prompting for Old Password During Login After NetID Password Change

If you changed your FDU NetID password on an FDU owned machine with Sophos Encryption, you may receive a prompt requiring you to enter your “Old Windows Password.” Enter your old NetID password so that Sophos can be updated with your new NetID password. If you do not know your old password or if the system does not accept your old password, please call UTAC at (973)-443-8689 and open a service request.

Last Modified: March 11, 2020 icon icon Copy Link

NWN Cloud Self-Service Portal Account Setup

Resources for: Faculty Staff
icon Close

NOTE: This article applies to NJ Campuses Only

The NWN Cloud Self-Service portal allows you to manage and view your phone settings.

  1. Call UTAC at (973)-443-8822 and let them know you are accessing your NWN Cloud Self-Service portal for the first time. UTAC will provide you a temporary password for logging in the first time
  2. Visit the self-service portal at fdu-selfcare.nwncloud.com
  3. Enter your full NETID@fdu.edu in the login field. Example: (SmithR@fdu.edu)
  4. Enter your NWN Cloud account password and click “Enter
  5. Next click on your Name on the top right of the screen. Hover over the drop-down menu and click “My Account
  1. Under “Web Password” un-check the checkbox, next to keep current value, and input set a custom password. When done, click “Apply” in the top right corner
  1. Your account is now active.
Last Modified: March 20, 2020 icon icon Copy Link

As a member of our community, your FDU NetID is your passport to accessing many of Fairleigh Dickinson University’s IT services. Most important is your student, employee, or alumni FDU Email account. When using FDU Email, you are an ambassador for our institution and our expectation is that you will conduct yourself in an efficient, effective, ethical and lawful manner. Please review our Policy for Acceptable Use of Email to ensure that you are adhering to all security and decorum requirements.

Effective Date: 01/01/2018

1.0 Introduction

The purpose of this policy is to ensure the proper use of e-mail by all those assigned a Fairleigh Dickinson University (FDU) e-mail account. This policy applies to any e-mail system that FDU has or may install in the future. It also applies to employee use of personal e-mail accounts via browsers, as directed below. All users of FDU e-mail systems have the responsibility to use their e-mail in an efficient, effective, ethical and lawful manner. E-mail users must follow the same code of conduct expected in any other form of written or face-to-face business communication. FDU may supplement or modify this policy for specific employees in certain roles. This policy complements similar FDU policies such as the Acceptable Use Policy and the Written Information Security Program (WISP) both of which can be found at http://isweb.fdu.edu Please read and follow those policies as well.

The University subscribes to the 1940 Statement of Principles on Academic Freedom and Tenure and the 1940 and 1970 Interpretive Comments issued thereon, formulated jointly by the Association of American Colleges and the American Association of University Professors. Nothing in this policy is intended to supersede those statements and principles. 

2.0 Ownership of Email Data

The University owns all University email accounts in the fdu.edu domain, or any subsequent domains it may create (University Email Accounts). Subject to underlying copyright and other intellectual property rights under applicable laws and University policies , the University also owns data transmitted or stored using the University Email Accounts.

3.0 Employee Responsibilities

FDU only supports the installation and usage of approved e-mail clients.

Usernames will be assigned as part of the University’s e-mail registration process and reflect internally mandated e-mail naming conventions.

3.1 Acceptable Uses

  • Communicating in a professional manner with other FDU associates about work-related matters.
  • Communicating in a professional manner with parties outside FDU for business purposes.
  • Personal communications that are brief and do not interfere with work responsibilities.
  • Users are allowed to access personal e-mail accounts on a limited basis, without disrupting business responsibilities. Access can be gained only by using a browser. Use of e-mail-specific protocols, such as POP3 and IMAP4, is prohibited, since they require specific firewall ports to be open.
  • Electronic messages are frequently inadequate in conveying mood and context. Users should carefully consider how the recipient might interpret a message before composing or sending the message.

3.2 Unacceptable Uses

  • Creating and exchanging messages that can be interpreted as harassing, obscene, racist, sexist, ageist, pornographic or threatening, as defined by University policies.
  • Creating and exchanging information that is in violation of copyright or any other law. FDU is not responsible for an associate’s use of e-mail that breaks laws.
  • Personal communication that interferes with work responsibilities.
  • Opening file attachments from an unknown or untrustworthy source, or with a suspicious or unexpected subject line.
  • Sending unprotected healthcare data and personally identifiable consumer data or other confidential information to unauthorized people or in violation of FDU’s Acceptable Use Policy, or the Written Information Security Program (WISP). , Health Insurance Portability and Accountability Act and/or Gramm-Leach-Bliley Act regulations. Exceptions may be authorized by the University Chief Information Security Officer working with the employee’s supervisor. Communications that strain FDU’s network or other systems unduly, such as sending large files to large distribution lists.
  • Communications to distribution lists of only marginal interest to members, and replying to the entire distribution list when a personal reply is effective.
  • Communications with non-specific subject lines, inarticulate language, and without clear purpose.
  • Auto-forwarding e-mail messages from your University e-mail account.
  • Using any e-mail system, other than FDU’s e-mail system, for FDU-related communications.
  • Circulating chain letters and/or commercial offerings.
  • Circulating unprotected healthcare data and personally identifiable consumer data that would violate U.S. Federal HIPAA and GLB regulations. Exceptions may be authorized by the employee’s supervisor and in conjunction with use of a University-approved e-mail encryption service.
  • Altering or forging the “From” line or any other attribution of origin contained in electronic mail or postings.
  • Using any of the University systems for sending what is commonly referred to as “SPAM” mail (unsolicited bulk email)

4.0 Privacy Guidelines

The University typically does not review the content of electronic messages or other data, files, or records generated, stored, or maintained on its electronic information resources; however, it retains the right to inspect, review, or retain the content of such messages, data, files, and records at any time without prior notification. Any such action will be taken for reasons the University, within its discretion, deems to be legitimate. These legitimate reasons may include, but are not limited to, 

  • responding to lawful subpoenas or court orders; 
  • investigating misconduct (including research misconduct); 
  • determining compliance with University policies and the law; and 
  • locating electronic messages, data, files, or other records related to these purposes. 

FDU maintains the right to monitor and review e-mail activity to ensure compliance with this policy, as well as to fulfill FDU’s responsibilities under the laws and regulations of the jurisdictions in which it operates. Users should have no expectation of privacy.

  • Except as otherwise stipulated in this policy, on termination or separation from FDU, FDU will immediately deny access to e-mail, including the ability to download, forward, print or retrieve any message stored in the system, regardless of sender or recipient.
  • Except as otherwise stipulated in this policy, employees who leave FDU will have their mailbox deleted within six months of their termination date. The employee’s manager may request that access be given to another employee who may remove any needed information within the same six month time frame.
  • FDU reserves the right to intercept, monitor, review and/or disclose any and all messages composed, sent or received on the University e-mail system. Intercepting, monitoring and reviewing of messages may be performed with the assistance of content filtering software, or by designated FDU employees and/or designated external entities. Employees designated to review messages may include, but are not limited to, an employee’s supervisor or manager and/or representatives from the HR, legal or compliance departments.
  • FDU reserves the right to alter, modify, re-route or block the delivery of messages as appropriate. This includes but is not limited to:
    • Rejecting, quarantining or removing attachments and/or malicious code from messages that may pose a threat to FDU resources.
    • Rejecting or quarantining messages with suspicious content.
    • Rejecting or quarantining messages containing offensive language or topics.
    • Re-routing messages with suspicious content to designated FDU employees for manual review.
    • Appending legal disclaimers to messages.
  • Electronic messages are legally discoverable and permissible as evidence in a court of law.
  • Users of the University’s computing and electronic communications resources must understand that electronic messages, data, files, and other records generated, stored, or maintained on University electronic information resources may be electronically accessed, reconstructed, or retrieved by the University even after they have been deleted.

5.0 Security

As with any other type of software that runs over a network, e-mail users have the responsibility to follow sound security practices.

  • Users should not use the e-mail system to transfer sensitive data, except in accordance with FDU data protection policies. Refer to the Written Information Security Program (WISP) found at http://isweb.fdu.edu under policies for more information. Sensitive data passed via e-mail over the Internet could be read by parties other than the intended recipients, particularly if it is clear text. Malicious third parties could potentially intercept and manipulate e-mail traffic.
  • In an effort to combat propagation of e-mail viruses, certain attachment types may be stripped at the University e-mail gateway. Recipients will be notified via e-mail when this occurs. Should this create a business hardship, users should contact the University Technical Assistance Center (UTAC).
  • Attachments can contain viruses and other malware. User should only open attachments from known and trusted correspondents. Suspicious attachments should be reported to the University Technical Assistance Center (UTAC).
  • Spam is automatically filtered at the University gateway in a highly efficient manner. Errors, whereby legitimate e-mail can be filtered as spam, while rare, can occur. If business-related mail messages are not delivered, users should check their local spam folder or the daily spam digest. If the message is not there, users should contact University Technical Assistance Center (UTAC).
  • Users will not be asked by OIRT or any other FDU group by e-mail for personal information such as usernames or passwords. Any such requests should not be responded to and should be referred to the University Technical Assistance Center (UTAC). Such approaches – known as phishing – are fraudulent approaches carried out for purpose of unlawful exploitation.

6.0 Operational Guidelines

FDU employs certain practices and procedures in order to maintain the health and efficiency of electronic messaging resources, to achieve FDU objectives and/or to meet various regulations. These practices and procedures are subject to change, as appropriate or required under the circumstances.

  • For ongoing operations, audits, legal actions, or any other known purpose, FDU saves a copy of every e-mail message and attachment(s) to a secure location, where it can be protected and stored for three years. Recovery of messages from this store is prohibited for all but legal reasons.
  • To deliver mail in a timely and efficient manner, message size must be less than 25MB. Messages larger than 25MB will be automatically blocked and users will be notified of non-delivery. Should this create a business hardship, users should contact the University Technical Assistance Center (UTAC).

Access to the content of electronic mail, data, files, or other records generated, stored, or maintained by any user may be requested from the University’s Associate Vice President of Technology Infrastructure for the reasons set forth below and shall be authorized as follows: 

  1. by the Associate Vice President of Human Resources for all University employees;
  2. by either Dean of Students for students; or 
  3. by the General Counsel for the purposes of complying with legal process and requirements or to preserve user electronic information for possible subsequent access in accordance with this policy. 

In all cases, the Office of the General Counsel must be consulted prior to making a decision on whether to grant access. In the case of a time-critical matter, if the authorizing official is unavailable for a timely response, the General Counsel may authorize access.

All full-time faculty who retire from the University may keep their email address for life if they request to do so.

All full-time faculty who leave the University for reasons other than termination for cause, may request email forwarding for up to six months.

7.0 Governance and Enforcement

This policy was created with input from the University’s Data Security Incidence Response Team (DSIRT). At the request of the University’s Chief Information Security Officer (CISO), the DSIRT will review this policy annually to ensure that FDU is in compliance with internal or external requirements. FDU faces liability if users violate the terms of this policy. Therefore, willful or repeated violations of this Acceptable Use Policy for e-mail can result in informal or formal warnings, the loss of e-mail privileges, and other sanctions including termination. Any such discipline shall be in accordance with processes and procedures of Human Resources and subject to any protections afforded under the University’s agreement with “Office & Professional Employees International Union”, the “Faculty Handbook”, and similar documents. Third parties who violate this Policy may have their relationship with the University terminated and their access to campus restricted.

For assistance with this policy, please contact the University’s Chief Information Security Officer (CISO).

Exceptions to this policy may be authorized by the University Chief Information Security Officer working with the employee’s supervisor.

Policy violations should be reported immediately to the University’s Associate Vice President of Technology Infrastructure

The University reserves the right to suspend an e-mail account while investigating a complaint or troubleshooting a system or network problem.

This document will be reviewed semi-annually and is available both electronically and in printed form at each of the Campus Computing Centers. 

It is the user’s responsibility to remain informed about the contents of this document. 

OTHER RELATED AND APPLICABLE POLICIES

Last Modified: March 11, 2020 icon icon Copy Link

Printing at Home while Connected to FDU VPN

Resources for: Faculty Staff
icon Close

Issue

When I am connected to the FDU VPN or Cisco AnyConnect Adapter, I am unable to print documents while working from home.

Cause

While connected to the FDU VPN network, you are unable to access any local printers or network devices / services to help protect your computer from various threats while working outside of the FDU Campus Network.

Resolution

In order to Print, please disconnect from the VPN client, and once your documents have printed, reconnect.

TIP:  Print jobs will continue to queue while you’re connected to the FDU VPN and will print when you disconnect from the VPN.

You can also connect a USB cable from the printer, to your laptop, where available, and you can remain on the FDU VPN and print anything you need.

If you require additional support, please call the University Technical Assistance Center at (973)-443-8822 or email FDUTAC@fdu.edu.

Last Modified: March 24, 2020 icon icon Copy Link

Introduction

This document outlines the university approved process for securely deleting Personal Information (PI) and Protected Health Information (PHI) after the PI or PHI has been encrypted.

Prerequisite

Eraser Portable® Secure Data Remove software needs to be installed on your computer. Please contact UTAC at (973)-443-8822 to request the installation of this software. A member of USAN will assist with the installation and setup of the software.

Document Deletion Process

To securely delete an unencrypted version of a document that contain PI and/or PHI that has been encrypted, complete the following steps:

  1. Find the “Secure Deletion” shortcut folder on your computer desktop screen
  2. Cut and paste the unencrypted version of the file to be deleted into this folder
  3. Find the “Eraser Portable” shortcut folder on your computer desktop screen and click to open the folder
  4. Double Click on “EraserPortable.exe“. The screen below will appear
  5. Click on the Green Run arrow to erase the file securely
secure 1
  1. A dialogue box will appear
  1. Click “Yes
  2. When the deletion process completes, you will see a report appear
  1. You may check your “Secure Deletion” folder to see if all documents have been erased

Outlook E-mail Deletion Process

To securely remove emails which contain PI and PHI from your Outlook client, complete the following steps:

  1. Delete the email from your Inbox and/or Sent items folder
  2. Delete the email from your Deleted Items
  3. Go to “Recover Deleted Items
  4. Highlight Deleted Items Folder
  1. Then go to Folder > Recover Deleted Items
  1. Highlight email which requires permanent deleting and select “Purge Selected Items” and then click “OK“. Now message is permanently out of your email system
  1. Finally, click “OK” on the following screen
secure8
Last Modified: March 19, 2020 icon icon Copy Link

This document outlines the University approved process for securely encrypting Personally Identifiable Information (PII).

Prerequisite

7Zip software needs to be installed on the end user’s computer. Please contact UTAC at (973)-443-8822 to request the installation of this software. If justification is needed, notify UTAC that 7Zip is needed to encrypt documents containing PII.

Process

Encrypting Files and Folders

To encrypt a single file, find the file in your directory (or where you have it saved).

  1. Right click on the document (do not open the document)
  2. On the drop down menu, Find 7zip
  3. Click “Add to archive…
  4. When 7zip opens, there are three (3) settings which need to be changed: 
    • Archive Format = Select zip from drop down
    • Encryption Method = select AES-256 from drop down
    • Check “show password” and type in a password that the user creates
    • Click “OK
    • A 7Zip Archive with the encrypted document will now appear in your directory

NOTE: Do not utilize any password that you use to access internal systems. The password cannot be recovered if forgotten.

Editing Encrypted Files and Folders

When editing an encrypted file or folder, you must make sure that you leave the 7zip archive open. If you close the archive, you will be able to work on the document, but it will not save.

Opening an Encrypted File or Folder

To open an encrypted file or folder:

  1. Right click on the 7Zip archive
  2. On the drop down menu, find 7Zip
  3. Click on the first “Open archive”
  4. Click to open your document

Saving an Encrypted File or Folder

To save an encrypted file or folder:

  1. Save the document as normal
  2. Upon closing document, the 7Zip archive will prompt the user to save the changes
Last Modified: March 19, 2020 icon icon Copy Link

If you are scheduled to attend class using Zoom and you run into technical difficulties, here are some steps you can take.

Common Fixes for Zoom Connection Issues

  1. Do. Not. Panic. This shift to distance learning is a sudden change. We will do everything we can to support your learning
    • Try your best to progress through the steps and troubleshooting resources below. Join when you are able. You can use the chat or hand-raising function once you join the class to let the faculty know if you have questions.
  1. Try to exit Zoom and open it again
  2. Try to restart your device and re-open Zoom
  3. Check that you do not have pop-ups blocked. Also check that you have “allowed” the Zoom browser extension to operate, if needed
  4. Try on a different device, if you have access to one. If you do not have access to a different device, proceed to step 6
  5. If you still cannot access Zoom after taking these steps, please email the FDU Tech Support fdutac@fdu.edu or (973)-443.8822 with a description of the problem (e.g., error message that you received). Please also bring the issue to the attention of your instructor so they can let you know what you missed in the class session that you were unable to attend

More resources for troubleshooting with Zoom (including device-specific resources)


Prepared by the Silberman College of Business

Last Modified: March 19, 2020 icon icon Copy Link
  • What is Webadvisor?

    Webadvisor is one of three systems used on campus using the WEB prefix in the name.  The other “WEB” systems are Webcampus and Webmail.   Webadvisor is used by students, faculty and staff for various purposes.  Students can use Webadvisor to search for classes, register for classes (if permitted), view class schedule, use Degree Audit (if permitted), accept Financial Aid award letters, pay bills on line, view grades, change emergency notification contact information and other tasks. Those faculty and staff that oversee budgets can access the information in Webadvisor.  Faculty can also view their class rosters and their class schedules, do enrollment verifications and do grading on-line.

  • How does one get a Webadvisor account?

    It depends upon whether or not you are an undergraduate student or a graduate student.  An undergraduate student (new or transfer) will get an account automatically after two things are accomplished.  The student must create an FDU Webmail account for themselves AND the student must be registered (through Enrollment Services) for classes for an upcoming semester.  Once these two things occur, within 2 business days (up to 3 business days in the summer) the student will receive an email containing the login information for their Webadvisor account.   If you are a graduate student and have been accepted into the University, you must create an FDU email account for yourself.  You can then either wait for the automatic process to generate the Webadvisor account and subsequent email containing the login information or you may request that a Webadvisor account be created for you by writing to webadvisoradmin@fdu.edu.

  • If I have a problem using Webadvisor, whom should I contact?

    Problems using Webadvisor may be divided into two categories: technical and non-technical.  For technical questions such as login problems, menu issues, login/password issues, error messages on screens, etc. you may write to webadvisoradmin@fdu.edu for help.  Someone is always available during business hours to field email questions sent to that address and sometimes people will answer questions after normal business hours as well.  Non-technical issues such as missing grades, financial aid awards, transcript requests, bill payments, degree audit questions, address changes, incorrect data, etc. should be addressed to the appropriate office such as Enrollment Services  or the Financial Aid Office.

    Enrollment Services

    Financial Aid

  • What are the hours of operation for Webadvisor?

    Webadvisor is available for use between the hours of 3:00am – 11:00pm daily.  During priority registration, the hours are from 8:00am – 11:00pm.  Please check for any changes in the hours of operation that are posted on the main Webadvisor page webadvisor.fdu.edu

  • How do I access Webadvisor?

    When you are on the main FDU webpage (fdu.edu) there is a dropdown menu on the top right labeled “Web Shortcuts”.  Under there you will find links to the various systems on campus including Webadvisor.  Once your account has been created you may use your email login and password to login to Webadvisor.  Do not click on the Prospective Students tab as you are already a student.  Only click on the Log In tab on the menu bar at the top.

  • What if I forget my login information for Webadvisor?

    If you forget your login or password for Webadvisor, that means that you have forgotten your email login and password since they are the same.  You must contact the FDU Help Desk at fdutac@fdu.edu or call (973)-443-8822 to ask for assistance.  Once your issue is resolved, you will be able to login to Webadvisor.

  • Do Webadvisor passwords expire?

    Yes, Webadvisor passwords expire when your FDU Net ID (email) password expires.  When you change your email password it will be valid to use to login to Webadvisor.

  • I received a message saying my account has been locked. What do I do?

    If you receive a lockout message, don’t panic.  Just close your browser and then start a new session and clear your browser cache or try logging in with a different browser.  You should be able to access Webadvisor again after you do that.

  • Why am I getting strange results in Webadvisor?

    Strange results such as inappropriate screen responses, missing menu items or text, etc. may be due to an incompatible version of the browser software you are using to access Webadvisor.  Or it may be due to the security settings in your browser.  In general, Internet Explorer, Mozilla Firefox, Google Chrome and Safari will work with Webadvisor.  However, the PC, laptop or other device you are using may be at a patch level that may cause problems using Webadvisor.  If that is the case, try using a different browser or even a different PC, laptop or other device.  You can also see if the security settings in your browser are set at a medium level and allow for cookies to be set.  Doing this may also clear up browser issues.  Also, some companies and other entities have firewalls that allow limited or no communication outside of the home network.  If that is the case, you will not be able to use Webadvisor from that site.

  • Why don’t I have the Degree Audit option?

    If the Degree Audit option does not appear on your menu, then your academic program of study is not set up to use Degree Audit.  For further information regarding that, please contact the Records Office in Enrollment Services or speak to your academic advisor.
    Enrollment Services

  • Why don’t I have the option to register for classes on Webadvisor?

    Being able to register for classes is dependent upon the academic program you are enrolled in.  Most graduate students can register for classes with the exception of a couple of academic programs.  Many undergraduate students may register for classes on-line through Webadvisor AFTER their initial enrollment.  Some undergraduate and graduate academic programs, however, do not permit on-line registration at all because they require the student to meet with their advisor who will register them.

  • Why don’t I see my grades on Webadvisor?

    If your grades do not appear on Webadvisor then your professor probably has not entered them on Webadvisor yet.  If the professor says they have entered them onto Webadvisor, then Enrollment Services has not yet done the verification process.  The verification process is done at least once daily.  Once the process has been run, the grades will appear.

  • I need an official academic transcript. How do I get one?

    You can use Webadvisor for this.  Just click on the Transcript link.  If you are an alumnus of FDU, you need an FDU email account.  You can create an alumni email account via the WEBMAIL page.  If you cannot get a transcript through Webadvisor then please visit the Enrollment Services web page on (fdu.edu) or call the Enrollment Services office on the campus you attend(ed).

  • I need an official academic transcript. How do I get one?

    Official transcripts are not available through Webadvisor.  Official transcripts may be requested from enrollment services.
    Enrollment Services Transcripts

  • Why don’t I see my Financial Aid Award Letter on Webadvisor so I can accept it?

    If you are expecting to see a Financial Aid Award Letter in Webadvisor and do not then your award is in a pending status and you should contact the Financial Aid Office.  All questions regarding your aid should be addressed directly to the Financial Aid Office.

  • Can I pay my bill online?

    Yes you can pay your bill online by clicking on the Make a Payment link.  You MUST have a balance to do this – there are no options for pre-payments of anticipated bills.

  • Account Information: Login, Password Help Information

    Please make sure you follow the directions below during Webadvisor hours of operation listed on the main Webadvisor page.

    Do not click on the Prospective Student tab.

    If you are locked out, the lockout is temporary.

    If you have login issues regarding Webadvisor you must contact the Help Desk at fdutac@fdu.edu or (973)-443-8822 because that means there is also a problem with your NetID credentials.

Last Modified: March 23, 2020 icon icon Copy Link

Logging into Webcampus

NOTE: Must have an FDU email account to login.

  1. Login to Webcampus with your full Webmail username (ex: yourname@fdu.edu) and password.
  1. Check your courses under the “My Courses” module 
  2. Select the class you wish to view content. 
  3. You will be taken to your course announcements page with links to other portions of your class. 

Creating a Zoom meeting link from within your course in Webcampus

When using the Zoom, all meetings and recordings are managed within Zoom cloud, in webcampus Instructors can schedule new meetings and students can join meetings from a single link.

NOTE: For existing courses only. For new courses starting next semester, a Zoom meeting link on the left hand navigation menu will be will added automatically.

  1. Click on the “+” sign on the top left corner
  2. Click on Tool Link
  1. Create a name for the link, example “Zoom Meeting”
  2. From the “Type” drop down menu scroll all the way to the end and select “Zoom Meeting”
  3. Make sure you check the box next to “Available for users” option
  4. Click “Submit
  5. A Zoom Link will be created in the left navigation menu area

Accessing the Zoom meeting link from the Tools menu

  1. Click on “Tools” from the left navigation area
  1. On the next page scroll all the way to the bottom and click on “Zoom Meeting”

Blackboard Documentation

Online Learning for Students Documentation

Video Links

Minimum hardware and software requirements


MinimumRecommended
Operating SystemWindows 7 or higher
Mac OSX 10.8 or higher
Windows 10
Mac OS 10.12
Processor1 GHz processor2 GHz or faster processor
Memory512 MB of RAM2 GB of RAM or higher
Monitor Resolution1024 x 7681024 x 768 or higher
Free Hard Disk Space5 GB of free disk space20 GB or higher of free space
Internet ConnectionDSL or Broadband (high-speed) Internet connection with a consistent minimum speed of 2 MbpsBroadband (high-speed) Internet connection with a speed of 4 Mbps or higher
JavaJava may be necessary to use Blackboard

For technical assistance please call the help desk from the Metropolitan campus dial 8822, from the College at Florham dial 8822, and from off campus dial (973)-443-8822. Or Email us at FDUTAC@fdu.edu

Last Modified: March 13, 2020 icon icon Copy Link

In the past, website subscriptions and renewals were approved by University Systems and Security (USAS), as the department held the role of both Information Security and Networking. An email would be sent to the department, and approval would be gained via an email response.

With the separation of Information Security from University Systems and Networking (USAN), a new process has been created to better serve those within the FDU community that utilize external websites for services.

Moving forward, requests for website subscriptions and renewals should be sent to UTAC at fdutac@fdu.edu. To expedite processing, please include information that answers the following questions:

  1. Is this a renewal or new subscription? 
  2. If renewal, was it previously approved by IT?        
  3. What is the url?        
  4. What data / information will you be sharing?
  5. What frequency will you be accessing the site?
  6. How do you upload / download information?
  7. Who else will access this site?
  8. Who is your technical contact that we can contact if necessary?

If information is missing, a representative of UTAC might reply inquiring more about the request.  When all information has been gathered, the ticket will be forwarded to our Information Security Officer.  He will review the request, engage the Networking team if necessary, and then either approve or deny the request (via email response) or inquire further, before closing out the ticket.

We hope this new process will help identify, track and move requests quickly through the process.

Last Modified: March 11, 2020 icon icon Copy Link

This is a handy little “cheat-sheet” for students, faculty and staff who are trying to understand some of the computer lingo used on campus.  The terms that seem to cause the most confusion for most people all start with the string “Web”.  That is not surprising because there are three systems that start with “Web”: Webadvisor, Webcampus and Webmail.

WEBADVISOR

Webadvisor is a product made by Ellucian, FDU’s administrative system vendor.  Webadvisor does different things for different people depending upon their role at the University.

Webadvisor for Students:

  • Search for Classes
  • Register for Classes
  • Access Class Schedule
  • Print an Unofficial Transcript
  • Check Term Grades
  • Degree Audit
  • Declaration to Graduate
  • Accept or Reject Financial Aid
  • Check Financial Aid Awards
  • View/Print Financial Aid Award Letter
  • Check Account Balance
  • Make a Payment (link to a third-party)
  • FDU Alert Personal Information
  • FERPA Emergency Releases
  • Parent/Guardian/Other Access to Student Information

Webadvisor for Faculty:

  • Search for Classes
  • View Term Class Schedule
  • View Term Rosters
  • Grading On-Line
  • Advisee Information
  • Degree Audit Advising
  • Enrollment Verification
  • Non-Attendance Forms
  • Budget Inquiry (Authorized faculty only)
  • FDU Alert Personal Information

Webadvisor for Staff:

  • Budget Inquiry (Authorized staff only)
  • View Personal/Sick/Vacation Leave Balances (Non-Exempt Staff)
  • FDU Alert Personal Information

A new undergraduate student (freshman or transfer) will get a Webadvisor account after they do two things: obtain an FDU email account (Webmail) and register for classes either through Enrollment Services or their advisor.  After doing these two things, the student will receive an email within two (2) BUSINESS days in their FDU email account saying that their Webadvisor account has been created and that they should use their email credentials as their login credentials for Webadvisor. Graduate students must create their email account and then send an email to webadvisoradmin@fdu.edu from their new FDU email account to request Webadvisor access.  The MIS Department is responsible for Webadvisor and help is available by writing to webadvisoradmin@fdu.edu .  

WEBCAMPUS

Webcampus is a course content management system.   FDU’s Webcampus is also known as the Blackboard System.  On-line courses are taught through this system which also allows for interaction between the student and faculty member as well as on-line class discussions.  Webcampus is handled by the Center for Teaching and Learning with Technology department.  The Organization feature in Webcampus is used by many faculty and staff members of the University.  To access the Webcampus system, an individual must have a Webmail account.  Any questions or problems with Webcampus should be funneled through the Help Desk.  The Help Desk can be reached by phone at 973-443-8822 or via email to fdutac@fdu.edu .

WEBMAIL

Webmail is FDU’s email system and is a means of electronic communication among all faculty, staff and students, as well as off-campus individuals.  It is important that every student have an FDU email account since an FDU email account is a pre-requisite of attaining a Webadvisor or Webcampus account.  The FDU email system is handled by the University Systems and Security Department.  Any questions or problems with Webmail should be funneled through the Help Desk.  The Help Desk can be reached by phone at (973)-443-8822 or via email to fdutac@fdu.edu.

Last Modified: March 11, 2020 icon icon Copy Link

Fairleigh Dickinson University Guest Wireless Accounts support the University’s mission by providing easy access to pertinent and topical information technology resources. Our policy ensures that guest wireless access is exclusively provisioned by University Systems and Networking, and establishes rules for proper management, security, and use of the University wireless network.

Type of Accounts

Choose your guest account type below to get started.

(no restrictions based on ports; available for up to one week; requires a valid FDU faculty/employee NetID to create.) 

(short-term sessions; limited bandwidth; ports limited to email, web browsing, VPN, and SSH; available for one day only, requires a valid FDU student NetID to create, each student can only sponsor one guest per day.)

(short-term sessions; limited bandwidth; ports limited to email, web browsing, VPN, and SSH; available for one day only, requires a valid FDU faculty/employee NetID to create, this conference account allow multiple users up to 200.)

EduRoam

(Available on Metro and Florham Campus Only)

Fairleigh Dickinson is a member of Eduroam (education roaming) which provides secure, world-wide roaming access service for the international research and education community. If your guest is coming from another Higher Education institution that is also a member of Eduroam, they will not require an FDU guest account. Instead, they can gain access to our Network simply by logging into the eduroam network with their regular credentials.

Policy

The computing and electronic communications resources at Fairleigh Dickinson University support the instructional, research, and administrative activities of the University. Users of these facilities may have access to University resources, sensitive data, and external networks. Consequently, it is imperative for all users to behave in a responsible, ethical, and legal manner. This document presents specific guidelines to appropriate behavior and use of FDU computing resources.

Support

  • Via Phone at 973.443.UTAC (University Technical Assistance Center) or (973)-443-8822. 
  • From The College at Florham by dialing the digits 8822.
  • From The Metropolitan Campus by dialing #8822.
  • Via email at FDUTAC@fdu.edu
Last Modified: March 11, 2020 icon icon Copy Link

Select employees of Fairleigh Dickinson University may be required to view Personal Information (PI) and Personal Health Information (PHI) as part of their daily responsibilities. For these employees, ensuring that our community’s PI and PHI remain secure and confidential is vital. The policy below will provide a baseline understanding of the data security protocols in place and the expectations on FDU employees to uphold them.

Effective Date: 02/07/2020

Last Revision: 09/01/2017

Last Review: 01/13/2019

I. OBJECTIVE 

The objective of Fairleigh Dickinson University (“University”) in the development and implementation of this comprehensive Written Information Security Program (“WISP”) is to create effective administrative, technical and physical safeguards for the protection of Personal Information (“PI”) and Protected Health Information (“PHI”).  The WISP sets forth the University’s procedure for evaluating its electronic and physical methods of accessing, collecting, storing, using, transmitting, and protecting PI and PHI.

For purposes of this WISP, PI means someone’s name and any one of the following data elements: 

  1. Social Security number, Social Insurance number, National Insurance number, or equivalent;
  2. Date of birth (MM/DD/YYYY),
  3. Driver’s license number or state-issued identification card number,
  4. Financial account number, or credit or debit card number, with or without any required security code, access code, personal identification number or password, that would permit access to an individual’s financial account,
  5. Passport number;
  6. Medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional or health insurance information; or
  7. Username or email address coupled with a password or security question and answer or any portion of any item in the list above that would permit access to an online account
  8. Student/Employee (i.e., Datatel) ID number coupled with a password or security question and answer or any portion of any item in the list above that would permit access to an online account.

For purposes of this WISP, PHI includes information that is created, received, and/or maintained by the University that is related to an individual’s health care (or payment related to health care) that directly or indirectly identifies the individual. 

PI or PHI shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public. 

Notwithstanding the above and irrespective of whether or not it’s considered PII or PHI, one should always take care and caution to use the minimum data elements necessary to perform the business function at hand.

II.  PURPOSE

The purpose of the WISP is to better: 

  1. Ensure the security and confidentiality of PI and PHI; 
  2. Protect against any anticipated threats or hazards to the security or integrity of such information; and
  3. Protect against unauthorized access to or use of such information in a manner that creates a substantial risk of identity theft or fraud. 

III. SCOPE

In formulating and implementing this WISP, the University has addressed and incorporated the following protocols: 

  1. identified reasonably foreseeable internal and external risks to the security, confidentiality, and/or integrity of any electronic, paper or other records containing PI and PHI; 
  2. assessed the likelihood and potential damage of these threats, taking into consideration the sensitivity of the PI and PHI;
  3. evaluated the sufficiency of existing policies, procedures, information systems, and other safeguards in place to control risks;
  4. designed and implemented a WISP that puts safeguards in place to minimize those risks, consistent with the requirements of the regulations in this document; and
  5. implemented regular monitoring of the effectiveness of those safeguards.

IV.  DATA SECURITY COORDINATOR

The University has designated the Chief Information Security Officer (CISO), working together with the Data Security Information Response Team (DSIRT), to implement, supervise and maintain the WISP. See Appendix II for contact information for the CISO and DSIRT. Together, they will be responsible for: 

  1. Initial implementation of the WISP;  
  2. Regular testing of the WISP’s safeguards; 
  3. Evaluating the ability of each of the University’s third party service providers to implement and maintain appropriate security measures for the PI and PHI to which the University has permitted them access, consistent with the regulations outlined in this document; and requiring such third party service providers by contract to implement and maintain appropriate security measures; 
  4. Reviewing the scope of the security measures in the WISP at appropriate intervals, including the review of any material change in the University’s business practices that may implicate the security or integrity of records containing PI and PHI; and
  5. Conducting training sessions for all University employees, and independent contractors, including temporary and contract employees, who have access to PI and PHI on the elements of the WISP. All attendees at such training sessions are required to certify their attendance at the training, and their familiarity with University requirements for ensuring the protection of PI and PHI.

V. INTERNAL RISKS

To combat internal risks to the security, confidentiality, and/or integrity of any electronic, paper or other records containing PI and PHI, and evaluating and improving, where necessary, the effectiveness of the current safeguards for limiting such risks, the following measures are mandatory and effective immediately: 

Internal Threats

  1. The University shall only collect PI and PHI of students, their parents, alumni, donors, suppliers, vendors, independent contractors or employees that is necessary to accomplish the University’s legitimate need to access said records, and for a legitimate job-related purpose, or necessary for University to comply with state or federal regulations.
  2. Access to records containing PI and PHI shall be limited to those persons who are reasonably required to know such information in order to accomplish a University legitimate business purpose or to enable the University to comply with state or federal regulations. 
  3. All persons who fail to comply with this WISP shall be subject to disciplinary measures, up to and including termination, irrespective of whether PI and PHI was actually accessed or used without authorization. Any such discipline shall be in accordance with processes and procedures of Human Resources and subject to any protections afforded under the University’s agreement with “Office & Professional Employees International Union”, the “Faculty Handbook”, and similar documents. 
  4. Access to PI and PHI shall be restricted to authorized University personnel only.
  5. Any PI and PHI stored shall be disposed of when no longer needed for business purposes or required by law for storage. Paper or electronic records (including records stored on hard drives or other electronic media) containing PI and PHI shall be disposed of only in a manner that complies with the regulations outlined in this document and as follows:  
    • Paper documents containing PI and PHI shall be shredded upon disposal so that PI and PHI cannot be practicably read or reconstructed; and
    • Electronic media and other non-paper media containing PI and PHI shall be destroyed or erased upon disposal so that PI and PHI cannot be practicably read or reconstructed.
  6. A copy of this WISP must be distributed to each current University employee and to each new University employee at the commencement of their employment. 
  7. Procedures for Terminated Employees (whether voluntary or involuntary)
    • Terminated employees must return all records containing PI and PHI, in any form that may at the time of such termination be in the former employee’s possession (including all such information stored on laptops or other portable devices or media, and in files, records, work papers, etc.)
    • A terminated employee’s physical and electronic access to PI and PHI must be immediately blocked. Such terminated employee shall be required to surrender all keys, IDs or access codes or badges, business cards, and the like, that permit access to the firm’s premises or information. Moreover, such terminated employee’s remote electronic access to personal information must be disabled.
  8. Physical Assets Protocol 
    1. All assets must be secured from theft by locking up and maintaining a secure workplace, whether that work takes place in University stores, offices, at a client site, in a car, hotel or in a home.  
      • All University laptops shall be deployed with encryption capabilities enabled. End users may not disable such encryption. Exceptions to this policy are as follows: 
        • With the explicit written authorization of the CISO;
        • May be disabled by OIRT personnel for temporary maintenance purposes only;
        • Loaner laptops temporarily assigned with the understanding they will not be used to store or access any information that is considered to be protected under this policy.
      • All laptops should be placed in the trunk of vehicle when and wherever they are parked. If no secure trunk or other storage is available, employees should, whenever possible, keep their laptops in their possession or find a way to secure and conceal it.
      • Laptops, PDAs, phones and other portable devices that may contain or have access to PI and/or PHI left in the office or at home over night should be kept in a locked and secure location.
      • Employees must have assets secured or within their physical possession while on public or private transportation, including air travel.
      • Files containing PI and/or PHI are not to be stored on local computer hard drives, shared drives or other external media (which include externally hosted services such as, but not limited to OneDrive, Google, and Drop Box) without prior written authorization from the CISO. If approved, the method of storage and access to the data will be determined by the CISO during the discussion and placed in writing. (See Appendix I for more detail).
  9. Access Control Protocol 
    • Access to electronically stored PI and PHI shall be electronically limited to those University employees having a unique log-in ID.  
    • Employees must ensure that all computer systems under their control are locked when leaving their respective workspaces. Employees must not disable any logon access.
    • Employees must log off of the VPN or Virtual Desktop (VDI) when they are not directly using those resources.
    • All Ellucian (Datatel) sessions that have been inactive for 60 or more minutes shall require re-log-in. 
    • After 5 unsuccessful log-in attempts by any Ellucian (Datatel) or Novell user ID, that user ID will be blocked from accessing those systems until access privileges are re-established by University Systems and Security.  
    • Employees must maintain the confidentiality of passwords and access controls: 
      • All Ellucian (Datatel), MS Active Directory or Novell passwords are required to adhere to strong password rules.
      • All Ellucian (Datatel), MS Active Directory or Novell passwords are required to be changed every 3 months.
      • Employees must not share accounts or passwords with anyone.
      • Employees should not record passwords on paper or in a document or in a place where someone other than the employee might have access to it. Tip: The University has identified a password vault application (Keepass); those interested should open a ticket with the UTAC requesting assistance on setting it up.
    • Where practical, all external or internal visitors to a department are restricted from areas where files containing PI and PHI are stored. Alternatively, visitors must be escorted or accompanied by an approved employee in any area where files containing PI and PHI are stored.  

VI. EXTERNAL RISKS

To combat external risks to the security, confidentiality, and/or integrity of any electronic, paper or other records containing PI and PHI, and evaluating and improving, where necessary, the effectiveness of the current safeguards for limiting such risks, the following measures are mandatory and effective immediately:

External Threats

  1. Firewall protection, operating system security patches, and all software products shall be reasonably up-to-date and installed on any computer that stores or processes PI and PHI. 
  2. All system security software including, anti-virus, anti-malware, and internet security shall be reasonably up-to-date and installed on any computer that stores or processes PI and PHI.
  3. To protect against external threats, all PI and PHI shall be handled in accordance with the protocols set forth above under “Internal Threats”.  
  4. In the event an individual inadvertently discovers he/she received PI or PHI from an external party, such PI or PHI shall be handled in accordance with the protocols set forth under “Internal Threats”.
  5. There shall be secure user authentication protocols in place that:
    • Control user ID and other identifiers;
    • Assigns passwords in a manner that conforms to accepted security standards, or applies the use of unique identifier technologies;
    • Control passwords to ensure that password information is secure.
  6. PI and PHI shall not be removed from the business premises in electronic or written form absent a legitimate business need and use of reasonable security measures, as described in this WISP.  
    • PI and/or PHI that MUST be transmitted in electronic form shall not be sent without encryption.  
    • PI and/or PHI in paper form must be secured.
  7. All computer systems shall be monitored for unauthorized use or access to PI and PHI.

VII.IN CASE OF LOSS/THEFT OR SUSPECTED LOSS/THEFT

If you have reason to believe that any PI or PHI has been lost or stolen or may have been compromised or there is the potential for identity theft, regardless of the media or method, you must report the incident immediately by contacting the University Technical Assistance Center (UTAC) at 973-443-8822. The UTAC is available 24 x 7. 

VIII. OTHER APPLICABLE POLICIES

Data Security Information Response Plan (April 15, 2015, not published on Web) 

IX. EXCEPTIONS

Requests for exceptions to this policy should be directed in writing to the Chief Information Security Officer. Only the Chief Information Security Officer in consultation with the DSIRT may grant such exceptions and will do so only after careful review and in writing. 

Appendix I

Technical requirements for the storage of files containing PI or PHI regardless of where the storage occurs will include but not be limited to the following:

  1. All file(s) should be secured with AES 256bit encryption unless actively open for review or modification.  
  2. It is the responsibility of the person handling the PI or PHI file to securely delete any files created as a product of the manipulation of those files. As an example, temporary files created by Microsoft Office programs or any other programs would need to be securely deleted as well as the clear text versions of the original file after the encrypted version is properly created and verified.  
  3. Programs used for Encryption/Decryption and secure file deletion must be approved by the CISO including the methods in which they are to be used.
  4. If the complete or partial PI or PHI containing file(s) are inadvertently written to a local hard drive, it is the user’s responsibility to diligently make sure the contents are securely deleted. 

Appendix II

DATA SECURITY INCIDENT RESPONSE TEAM (ROLES AND RESPONSIBILITIES) 

The Data Security Incident Response Team membership includes the Chief Operating Officer, the Chief Information Officer, the Chief Information Security Officer, the Chief Academic Officer, the University General Counsel and the University Risk Manager. Each member of the Data Security Incident Response Team (DSIRT) has responsibilities related to the security of all the organization’s sensitive information. The DSIRT members listed below have specific responsibilities with regard to the reporting and handling of data security incidents. Note that one person may serve in multiple roles.

Senior Vice President for Finance & Administration: HANIA FERRARA
Daytime telephones: office: 201-692-2381; Email: ferrara@fdu.edu

Chief Information Officer (CIO): NEAL STURM
Daytime telephones: office: 201-692-8689; Email: sturm@fdu.edu

Chief Information Security Officer (CISO): JEREMY LIVINGSTON
Daytime telephones: office: 201-692-7672; Email: jeremy_livin@fdu.edu

Privacy Officer: JEREMY LIVINGSTON
Daytime telephones: office: 201-692-7672; Email: jeremy_livin@fdu.edu

Chief Academic Officer (CAO): GILLIAN SMALL
Daytime telephones: Office: 201-692-7093; Email:  gsmall@fdu.edu

University General Counsel: ED SILVER
Daytime telephones: office: 201-692-7071; Email: edsilver@fdu.edu

University Risk Manager: GAIL LEMAIRE
Daytime telephones: office: 201-692-7083; Email: lemaire@fdu.edu

Last Modified: March 11, 2020 icon icon Copy Link
binoculars icon
binoculars icon Couldn’t find what you were looking for?
Submit a ticket and our Support Service Team will contact you to assist.
background