Author: usanadmin

Reporting Phishing or Junk Emails

Resources for:

The Report Message add-in works with Outlook to allow you to report suspicious messages to Microsoft and manage how your Microsoft 365 email account treats these messages. Messages marked as junk by your Microsoft 365 email account are automatically moved to your Junk Email folder. However, spammers and phishing attempts are continually evolving. If you…

Last Modified:

Reporting Threatening or Harassing Phone Calls

Resources for:

Procedure for reporting a threatening or harassing landline call.

Last Modified:

Safeguard Rules Under The Gramm-Leach-Bliley Act

Resources for:

Responsible Office: Data Security Incident Response Team (DSIRT)Responsible Official: Chief Information Officer, Chief Information Security OfficerDSIRT Approval: Neal M. Sturm on behalf of DSIRT Effective Date: 12/01/2022Last Review Date: 11/22/2022Last Revision Date: 11/22/2022 (1) Nonpublic personal information means: (i) personally identifiable financial information; and (ii) any list, description, or other grouping of consumers (and publicly…

Last Modified:

Safeguards Against Cybercrime

Resources for:

Being connected to the internet suggests that the internet is connected to you. Without concern and proper safeguards to protect the information you share, you are at a greater risk of cybercrime. The university assumes its share of responsibility to protect sensitive information but you must do the same. The vast majority of data and…

Last Modified:

SAMI Support Public Request Form

Resources for:

The SAMI Support portal requires a valid NetID and password, along with DUO multi-factor authentication, for access. Upon entry, users can create new tickets, review open or closed requests, and explore the IT Knowledgebase for solutions to common issues. Access the support portal using the button below: If you need to open a request and…

Last Modified:

Secure Deletion Steps for Personal Information

Resources for:

Introduction This document outlines the university approved process for securely deleting Personal Information (PI) and Protected Health Information (PHI) after the PI or PHI has been encrypted. Prerequisite Eraser Portable® Secure Data Remove software needs to be installed on your computer. Please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) to request the installation…

Last Modified:

Secure Encryption Steps for Personal Information

Resources for:

This document outlines the University approved process for securely encrypting Personally Identifiable Information (PII). Prerequisite 7Zip software needs to be installed on the end user’s computer. Please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) to request the installation of this software. If justification is needed, notify UTAC that 7Zip is needed to encrypt…

Last Modified:

Self-Service Tutorial

Resources for:

Self-Service is an interactive web application that enables students, faculty, and staff to view their individual information contained in FDU’s student information system. Students can use Self-Service to do things like view their financial aid, pay their bills, and register for classes. Likewise, faculty will use Self-Service to verify enrollment and enter grades. To navigate…

Last Modified:

Sending an Encrypted File Using Email

Resources for:

According to FDU’s Written Information Security Program (WISP), in no case should they be sending or storing WISP protected information without the explicit authorization of the Chief Information Security Officer (CISO). If approved, these instructions will provide you with guidance on the methodology. Instructions for Windows If you do not have a university issued laptop…

Last Modified:

Setting up a Security Key for Duo Authentication

Resources for:

Setting up a security key for Duo authentication ensures a higher level of protection for your online accounts. This guide walks you through the process step by step, helping you seamlessly integrate this secure method into your two-factor authentication system. Recommended Security Keys For enhanced security and seamless integration with Duo authentication, we recommend purchasing…

Last Modified: