icon

Computing Services

The Computing Services department manages the University computer labs, develops and maintains the configurations of University owned laptop and desktop computers, performs maintenance and repairs on University owned software and hardware, deploys and maintains PC software site licenses, and provides general technical support for PCs at the University.

Help Desk
background
Search Department Resources

Acceptable Use Policy for Computer Usage

Resources for:
icon Close

Original Effective Date: 02/17/2013
Revised Date: 04/20/2023


The computing and electronic communications facilities at Fairleigh Dickinson University support the instructional, research, and administrative activities of the University. Users of these facilities may have access to University resources, sensitive data, and external networks. Consequently, it is imperative for all users to behave in a responsible, ethical, and legal manner. This document presents specific guidelines for appropriate behavior and use of FDU computing resources.

SCOPE

These guidelines apply to all users of FDU computing resources. Users include all students, faculty, staff, visiting faculty, volunteers, guests of the administration, and external individuals or organizations.

Computing resources include, but are not limited to, desktop and laptop computers, file servers, smart phones, email and electronic communications, software, University-assigned email accounts, data storage, and networking equipment used to link these components together and to the Internet, whether owned, leased, or licensed by FDU. In addition, computing resources include use of the University network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network. Moreover, this policy applies to all usage of university computing resources, whether that usage occurs through a university owned device or personal device.

University property, including computing resources, are provided to you for University business. Although security protocols have been put in place to restrict access to computing resources to protect them against unauthorized access by external parties, it is important that all members of the University community take appropriate measures to safeguard these resources.

Users – and not the University — are responsible for the materials that users prepare, receive, or transmit through computing resources. Thus, as a condition of using the University’s computer system, all users represent that they are in compliance with applicable laws and University policies, including l federal, state, and international copyright and other intellectual property laws and laws regarding defamation.

ACCEPTABLE USE

Those who make use of the FDU computing resources are required to behave in a manner consistent with FDU’s codes of conduct. As a user of this network, you agree to the following usage guidelines:

  1. You will not use an account that does not belong to you. You will use only the computers, computer accounts, and computer files for which you have authorization. You may not share accounts, files, or access to computer resources with any unauthorized person.
  2. You are responsible for any computer account you have been given. You will set a password on the account that is in compliance with university password policies, and you may not share this password with any other person. If you discover that someone has made unauthorized use of your account, you should change your password immediately and immediately report the event to one of the individuals listed in Appendix 1.
  3. You agree not to intentionally seek out information about, copy, or modify password files, other users’ files, or disks and tapes belonging to other people, unless specifically authorized by those persons, whether at FDU or other facilities.
  4. You should not attempt to decrypt material to which you are not entitled or attempt to gain rights you have not been specifically granted by the owner. If you observe or discover a gap in system or network security, you agree to inform one of the individuals listed in Appendix 1 and not to exploit the gap.
  5. You agree to refrain from any activity that interferes with a computer’s operating system or its logging and security systems, or that may cause such effects. Additionally, users are not authorized to remove any security software installed on FDU equipment by FDU Systems personnel.
  6. You must be sensitive to the public nature of computing resources and agree not to transmit, post, or otherwise display material that is threatening, obscene, harassing, or defamatory. The use of University computing resources to libel, slander, or harass any other person is not allowed and could lead to University discipline as well as legal action by those who are the recipients of these actions.
  7. You agree not to make copies of or distribute software the University owns or uses under license, unless the owner of the software or the owner of the license has specifically granted permission to copy. If in doubt as to whether you have permission to copy software, assume you don’t.
  8. Messages, statements, and declarations sent as electronic mail or public postings should be treated as if they were tangible documents. From electronic identifiers used in the transmission of messages, addressees can see the University is the source of the message or its system is being used to transmit it, similar to how letterhead or return addresses on a tangible document would identify the University. Therefore, as a representative of the FDU community, you are expected to respect the University’s good name in your electronic dealings with those both within and outside the University. Moreover, in so far as employees make use of FDU computing resources to relay personal opinions, it is their obligation to make sure that no addressee can infer that their personal opinions are necessarily shared or authorized by the University, and they are obligated to clearly identify their opinions as their own and not those of the University.
  9. You agree not to create, alter, or delete any electronic information contained in any system that is not your own work, unless specifically authorized by the owner of that information.
  10. You agree not to create, send, or forward electronic chain mail letters. You agree not to attempt to alter or forge the “From” line or any other attribution of origin contained in electronic mail or postings. You agree not to use any of the University systems for sending what is commonly referred to as “SPAM” mail (unsolicited bulk email).
  11. You may l not use FDU computing resources as a means of obtaining unauthorized access to any other computing systems.
  12. FDU’s data storage on University servers, hosted servers, third party storage, or hosted storage, is an FDU computing resource with costs attached and should be used with care and discretion. It is primarily meant for current class work, research and development projects, business files, and temporary storage of other files. Users are expected to keep their disk usage reasonably minimized, in keeping with their University role.
  13. Network addresses such as TCP/IP addresses and machine addresses are assigned by University Systems and Networking staff and may not be altered or otherwise assigned without the explicit permission of the Associate Vice President of Systems and Networking (or other designee). In addition, no equipment may be attached to the network without the explicit permission of the Associate Vice President of Systems and Networking (or other designee). This applies to all staff as well as academic departments.
  14. FDU’s computing resources are not to be used for the transmission of commercial or personal advertisements, solicitations, and promotions or for extended reproduction of political, ideological or commercial material originated by a person or organization. This includes but is not limited to the execution of revenue-generating advertising programs which pay users when the programs are run. The Associate Vice President of Systems and Networking (or other designee) may suspend this rule when it is in FDU’s best interest to permit such activity.
  15. Users may not contract with external Internet services, service providers, or the like without the explicit written approval of the Associate Vice President of Systems (or designee) and Networking and compliance with Finance and Office of General Counsel policies.
  16. Without the explicit written permission of the Associate Vice President of Systems and Networking (or designee) you agree not to run any of the following protocols or services:
    • Port scanners, network monitors or other types of utilities that probe any other computer, be they inside or outside FDU’s network.
    • Routing or network serving protocols such as RIP, IGRP, OOTP or DHCP on the network.
    • Daemons, processes or programs that accept incoming connections, as a server would.
    • Streaming media servers or any other server that broadcasts continuous data streams.
  1. FDU’s computing resources, including equipment, network, services, and wiring may not be modified or extended beyond the areas of their intended use.
  2. Network connections may not be used to provide network access to anyone outside the University community or for any purposes other than those that are in direct support of the academic mission of the University.
  3. All computers connected to FDU’s network must run an operating system and configuration that is supported by its vendor with regard to security patches and updates, as well as antivirus software with current virus definitions. It is the user’s responsibility to keep their virus definitions up to date and to apply all critical operating system updates. More information is available at https://it.fdu.edu or submit questions through the SAMI Support portal or by emailing fdutac@fdu.edu.
  4. Users may not alter the operating system or configuration of University owned computers without the explicit written authorization of the Associate Vice President of Systems and Networking (or designee).

PERSONAL USE

Computing resources are created to support the instructional, research, and administrative activities of the University, and are the property of the University. Personal use of the University’s computing resources, except for students enrolled at the University, should be incidental and kept to a minimum. Use of such resources by an employee for other than work-related matters should be reasonable and limited so that it does not prevent the employee from attending to and completing work effectively and efficiently, does not incur additional cost to the University, and does not preclude others with work-related needs from using the resources, including the shared campus and Internet bandwidth.

Department Heads and other administrators may enact additional restrictions to further limit employees’ personal use of University computing resources. These restrictions may include but are not limited to: limiting time spent reading or writing personal email or visiting web pages, and limitations on acceptable content due to the possible exposure of screens to other individuals. Human Resources must be consulted, in advance, about any proposed restrictions.

SECURITY

Users should use reasonable available methods to safeguard their data, including regular changes of passwords, and encrypting sensitive data. In the event that files have been corrupted as a result of intrusion, you should notify a system administrator immediately. Please note that FDU’s computing resources are not completely secure. It is possible that others will be able to access files by exploiting shortcomings in system security. For this and other reasons, FDU cannot assure confidentiality of files and other transmissions.

The Office of Information Resources and Technology (“OIRT”) and each of its departments attempt to provide reasonable security against damage to files stored on FDU’s computing resources by filtering all outgoing and incoming electronic mail for viruses and junk mail and making regular backups of systems.

In connection with the University’s migration to Office 365, the University adopted a policy of retaining copy of each fdu.edu email for three (3) years.  This means, regardless of individual user action, the University will maintain a copy of all email traffic for a period of 3 years. 

In the event of lost or damaged files, a reasonable attempt will be made to recover the information; however, the University and the University Information Technology staff cannot guarantee recovery of the data or loss of data due to media failure, floods, fires, etc.

OIRT and each of its departments will make reasonable attempts to provide error-free hardware and software on our computing resources, however, it is not possible to guarantee this, and information provided by staff members is not guaranteed to be correct.

PRIVACY

Users should exercise caution when storing any confidential information in electronic format, because the privacy of such information cannot be guaranteed. User(s) must be aware that any personal files, including e-mail, maintained on University computing resources are University property and are subject to University storage, retrieval, and review. Individuals using FDU computing resources should have no expectation that any information transmitted through or stored on FDU computing resources, whether the information is contained on a computer hard drive, computer disks, University or third party server or in any other manner, will be private. By using FDU computing resources, the user consents to the University’s (and its designees’, both internal and external) access to their electronic files, documents, and materials stored, transmitted, or otherwise accessible on those resources.

Examples of where the University might access a user’s electronic files include system backups, which access all files in a user’s account; software upgrades which may require editing startup files in a user’s account; diagnostic and trouble-shooting activities, which may, for example, require viewing the address headers of e-mail messages to determine the cause of problems; keystroke monitoring of sessions to determine inappropriate use of the computing facilities; searches in connection with a litigation, threatened litigation, governmental proceeding or investigation; investigation of a possible data breach; investigation of possible breach of University policy, rules, handbooks, or protocols; and other measures to safeguard the University’s systems and compliance with laws. These examples are not intended to limit the University’s right to access a user’s electronic files under circumstances deemed appropriate by the University. In such situation(s), University computer resources in the possession of a user, or otherwise assigned to an individual, may be accessed, reviewed, duplicated, stored, and forwarded by appropriate personnel without the user’s permission or knowledge.

Without limitation, because employees are granted access to and use of FDU computing resources to conduct University business, the University reserves the right to access electronic mail messages left on or transmitted through the University’s computing resources. Employees should not assume that such messages are private and confidential or that the University or its designated representatives will not have a need to access and review this information.

The Family Education Rights and Privacy Act (FERPA) binds all users who have access to student data and this policy is subject to FERPA requirements. In general, FERPA gives students more control over their educational records, and it prohibits educational institutions from disclosing “personally identifiable information in education records” without the written consent of the student (subject to specified exceptions). To find out specifically what information you may or may not give out and to whom, contact the office of the Vice President for Student Affairs.

POLICY VIOLATIONS

Policy violations should be reported immediately to any one of the individuals listed in Appendix 1.

Violations of this policy will be addressed as described in the Student, Faculty and/or Employee Handbooks, any relevant contracts, and, if applicable, State and Federal law or regulations. University students and employees who violate this Policy will be met with appropriate disciplinary action, up to and including dismissal, expulsion, or termination from the University. Third parties who violate this Policy may have their relationship with the University terminated and their access to campus restricted. In addition, a user’s system privileges can be suspended for a specified time period or revoked and/or a monetary fine may be imposed on those in violation to reimburse the University for the staff time and other costs of investigating and rectifying the violation.

The University reserves the right to suspend computing resource privileges while investigating a complaint or troubleshooting a system or network problem.

This policy is subject to revision. Comments and suggestions are welcome and should be sent to Stuart Alper, Associate Vice President of Systems and Networking, mailstop T-BH1-01, or stuper@fdu.edu.

It is the user’s responsibility to remain informed about the contents of this document.


CONTACTS

Stuart Alper
Associate Vice President of Systems and Networking
Mailstop T-BH1-01
(201)-692-2414
stuper@fdu.edu

Saul Kleinman
Associate Vice President of Management Information Systems
Mailstop T-BH2-03
(201)-692-2065
saul@fdu.edu


Last Modified:

Accessing an FDU Email Account on a Mobile Device Using the Outlook App

Resources for:
icon Close

The easiest way to access your FDU email account on your mobile device is to install the Outlook app from either the App Store (Apple) or the Play Store (Android). We support and advise using this method due to the program’s robustness and integration of all Office365 features. Follow the steps below to install and set up the Outlook app on your phone.

Outlook App on Apple iOS and Android Mobile Devices
  1. Use the links below to install the Outlook app onto your mobile device.
Android Play Store
Apple App Store
  1. Launch the app and press on “Add Account” if on an Android device. It will then prompt you to input your FDU email address. On iOS, the app will launch and immediately ask you for your FDU email address. Once filled out press “Continue” on Android. On iOS press “Add Account”
Android
Android
iOS
  1. You will be routed to the FDU Single Sign On Page, from here input your FDU email address and password and press “Sign In
  1. For security purposes, all applications which use FDU’s Single Sign On (NetID) require Duo two-factor authentication. After inputting your FDU NetID login information, Duo requires you to complete a method of second-factor authentication
  1. Your FDU email account has now been added to your device successfully. Ensure the email account is listed on your Outlook application.
close
Last Modified:

Adding a FDU Email Account to a Mobile Device’s Native ‘Mail’ App

Resources for:
icon Close

These instructions demonstrate adding an FDU email account to an Apple mobile device’s native Apple “Mail” app. Unfortunately, adding an FDU email account on an Android OS mobile device’s native “Mail” app is currently unsupported by FDU IT support. Information regarding adding an FDU email account to an Android OS mobile device via the Outlook App can be found below for Android OS mobile device users.

Note:

The easiest way to access your FDU email account on your mobile device is to install the Outlook app from either the App Store (Apple) or the Play Store (Android). FDU IT supports and advises using this method due to the program’s robustness and integration of all Microsoft 365 features. A link with instructions for the Outlook app on mobile devices can be found at the bottom of this page.

Setting up your FDU Email Account in the Mail app on iOS
  1. Go to the “Settings” app
  1. Tap “Mail
  1. Tap “Accounts
  1. Tap “Add Account” and then select or tap “Microsoft Exchange
  1. Enter your FDU email address and a description of your email account in the corresponding text boxes. Please note that the default description name for the account will be ‘Exchange’ if left unchanged. Tap “Next” to continue
  1. Tap “Sign In
  1. Enter your FDU email address and password. Tap “Sign In” to continue
  1. For security purposes, all applications which use FDU’s Single Sign-On require Duo Two-Factor Authentication (2FA). After entering your FDU NetID login credentials, Duo requires you to complete a method of second-factor authentication
  1. Choose the FDU NetID account information you want to synchronize or access on your iOS mobile device by toggling the choices on/off. Tap “Save” to continue
  1. Your FDU email account has successfully been added to your iOS mobile device
close
Setting up your FDU Email Account on Android OS

Due to the multiple Android OS mobile device manufacturers (Samsung, Google, or LG) each having their own native ‘Mail’ app, email setup and features differ depending on the manufacturer of the Android OS devices. For this reason, it is best practice to use the Microsoft ‘Outlook’ app found in the Google Play Store. Follow the instructions below to set up Outlook on Android OS.

close
Last Modified:

Computer Lab Mission Statement

Resources for:
icon Close

The FDU computer labs provide a safe and welcoming study space for our users. The computer labs provide access to technological resources such as: current specialty software applications for a variety of majors, access to online libraries for research, internet access, and print services. Our labs are also available to faculty for instruction in both technology-intensive and non-intensive majors. The computer labs are also used as a venue for various workshops and university programs. The lab hours are flexible to meet the needs of both resident students and commuter students. The lab operations also provide on-campus work opportunities for our students to develop their skills and offer customer service and technical support to our campus community.

FDU Computer Labs Provide:

  • A conducive learning space that enables students to develop the skills necessary for collaboration and teamwork.
  • Hands on experience with current hardware and software applications used for a variety of majors.
  • Students access to the same technology resources for the purposes of research, printing, and producing professional work.
  • Customer service and on-site technical support from our student staff.
  • Access and opportunities for students to develop their computer skills.
  • Interactive learning opportunities between faculty and students; theory and application in one setting under the supervision of faculty with the support of student staff.

Last Modified:

Computer Lab Reservation Policy

Resources for:
icon Close

Due to the increasing demand of the academic computer facilities, a general document detailing the policies for computer lab reservations has been outlined. The purpose of the computer lab reservation policy is to provide faculty, staff and students with equitable access to campus computing lab resources. Most computer labs are used as classrooms and they are available for open-access use when there are no classes in session.

There are currently four Computing Services computer labs which can be used for classroom instruction on each campus. They are: D206, D207, D208, and D209 located in the Dreyfuss Building on the Florham Campus. The computer labs located on the Metropolitan Campus are: DH2163 and DH2164 in Dickinson Hall and UH Front Lab (UH22) and UH Back Lab (UH28) in University Hall. Also, there are three multimedia labs; two on the Florham campus and one on the Metropolitan campus. The multimedia labs for the Florham Campus are: D211-Animation Lab and ZEN110 – Graphic Design Lab) located in the Dreyfuss and ZEN Buildings. On the Metropolitan campus, the multimedia lab (MML) is located in Becton Hall Room 403. The multimedia labs are primarily used for courses offered by the FDU School of Arts. All labs used for classroom instruction and general use are equipped with a LaserJet printer and data projector. The Animation Lab is equipped with 3-D printers. All multimedia labs are equipped with ZOOM capability to support hybrid instruction.

If you have any questions regarding the lab reservation policy, please contact Denzel James via email at: d.james@fdu.edu

Last Modified:

Computer Tips, Tricks, and Recommendations

Resources for:
icon Close

As technology evolves and new features are offered, there may be times when unwanted or unexpected things happen. This page is dedicated to providing some tips, tricks, and recommendations to circumvent these undesired circumstances.

Normalize Sound Levels – Windows

Microsoft Windows 10 automatically adjusts audio levels between different applications. This can affect the level of sounds from various applications depending on what program is currently being used. This feature can be turned off using the instructions below.

Instructions
  1. From the Sound Icon in your task bar, single right-click
  1. Click “Sounds
  1. Click “Communications” tab.
  1. Select the “Do nothing” radial button
  1. Click “Apply
  2. Click “OK
close

Adjust Microphone Settings – Windows

To ensure clear and audible audio in virtual meeting applications, such as Zoom, please follow the instructions below.

Instructions
  1. Right-click the Audio icon in the system tray portion of the task bar
  1. Click “Sounds
  1. Click “Recording

Note

Not all options may be visible.

  1. Right Click on “Microphone Array” and select “Properties
  1. Click the “Advanced” and un-check “Enable Audio Enhancements
  1. Click “Apply
  1. Click “OK
close

Adjust Power Options – Lenovo Laptops

Default power profiles in Windows 10 are configured to balance performance and battery life. To change these settings, please follow the steps below.

Instructions
  1. Click on Start, and then click “Settings
  1. Click on “System
  1. Select “Power & Sleep
  1. To modify power settings while the laptop is plugged in or on battery power, modify the below options

Note:

Selecting higher times may result in shorter battery life

  1. For additional power settings, such as the laptop lid and power button settings, click Additional power settings

Note

Depending on window size, this option may be located towards the bottom or on the right side of the screen.

  1. Select either “Choose what the power buttons door “Choose what closing the lid does
  1. The options below will allow modifying the effects of pressing the power button and closing the lid

Note

Setting DO NOTHING when closing the lid can lead to drastically less battery life as well as overheating when the laptop is placed inside a bag or briefcase.

close

Restarting A Computer

Rebooting a device is highly encouraged as it will help keep the system running at peak performance. The benefits of a weekly reboot include:

  • Mitigate vulnerabilities to cyber-attacks by applying critical updates
  • Prevent performance degradation
  • Prevent application memory faults
  • Effectively apply system policies

To restart a device, follow the instruction below.

Tip

Make sure any open application is saved and closed before a restart is performed. This includes applications like Outlook, Word, Excel and any other applications that may be opend.

Instructions for Windows
  1. Click the Start bottom on the bottom left hand side of the task bar
  1. Click the “Powerbutton
  1. Click “Restart

Note

Clicking “Shutdown” will not always properly apply updates or produce the desired effect. Clicking “restart” is the recomended option.

close
Instructions for macOS
  1. Click the “Apple” at the top left-hand side of your screen
  1. Click “Restart
close
Last Modified:

Computing Services Computer Labs

Resources for:
icon Close

Computing Services has multiple computer labs available on both New Jersey Campuses for classroom instruction and student use. Computer Lab hours of operation are subject to change based upon utilization throughout the semester.

Spring Semester 2024 Computer Labs Hours

Jan 22, 2024 – May 14, 2024

Florham Campus

Dreyfuss Building
BuildingMondayTuesdayWednesdayThursdayFridaySaturdaySunday
Dreyfuss Building8 AM-
11 PM
8 AM-
11 PM
8 AM-
11 PM
8 AM-
11 PM
8 AM-
5 PM
10 AM-
5 PM
12 PM-
9 PM
Dreyfuss
211, 212, 213
8 AM-
11 PM
8 AM-
11 PM
8 AM-
11 PM
8 AM-
11 PM
8 AM-
5 PM
10 AM-
5 PM
12 PM-
9 PM

Rooms:

  • D206
  • D207
  • D208

  • D209
  • D211
  • D212
  • D213

Phone:

(973)-443-8689

close

Metropolitan Campus

Dickinson Hall – Hackensack
BuildingMondayTuesdayWednesdayThursdayFridaySaturdaySunday
Dickinson Hall8 AM-
11 PM
8 AM-
11 PM
8 AM-
11 PM
8 AM-
11 PM
8 AM-
5 PM
ClosedClosed

Rooms:

  • Lab A (DH2163)
  • Lab B (DH2164)
  • Lab C (DH2165)

Phone:

(201)-692-7111

close
University Hall – Teaneck
BuildingMondayTuesdayWednesdayThursdayFridaySaturdaySunday
University Hall8 AM-
11 PM
8 AM-
11 PM
8 AM-
11 PM
8 AM-
11 PM
8 AM-
5 PM
10 AM-
6 PM
2 PM-
10 AM

Rooms:

  • Front Lab (UH 22)
  • Back Lab (UH 28)
  • UH Side Lab

Phone:

(201)-692-7112

close
Student Union Building – Teaneck

Rooms:

  • Multipurpose Room 135

Phone:

(201)-692-2222

Note

The Student Union Building Multipurpose Room will be locked at all times. To gain access to the Student Union Building computer lab, you will need to contact Public Safety at (201)-692-2222.

close

Lab computers are available on a first-come-first-serve basis unless reserved for classes.
Class reservations are posted at the lab entrances.

Last Modified:

Connecting and Using an All-in-One at Home

Resources for:
icon Close

How to Connect an All-in-One for Work-at-Home

Making the Physical Connections

  1. Make the appropriate connections to the back of the all-in-one.
    • Plug in the power cable to the power port on the back of the all-in-one.
    • A physical network connection is only required if you do not want to or can not use wireless.
    • Both the keyboard and mouse can be plugged into any USB port.
  1. Turn the PC on and sign in as normal.

Connecting to Wi-fi (Skip if Using a Physical Network Cable)

  1. Click on the network icon on the bottom-right hand of the Start bar near the system clock.
  1. A list of available networks will populate. Select your home wireless network.
  1. Select your network and click “Connect“.
  1. Enter the network key for your wireless router. This can sometimes be located on the side or bottom of your router and/or modem. Click “Next“.

Connecting to VPN from Home

  1. Click on the arrow on the bottom right hand of the Start bar near the system clock and right-click on the “Cisco VPN Access” icon. On the pop-up menu, click “Connect“.
  1. If this is the first time connecting to VPN service please enter the text below as shown into the VPN field and click “Connect“.
  1. Enter your full NetID information and click “Ok“.
  1. Once a successful connection is made a prompt will appear and the icon for the Cisco VPN Access in the system try will appear with a lock.
Last Modified:

Deleting Web Browser Cookies

Resources for:
icon Close

Select your browser below to learn how to delete your web browser cookies.

  • Click on the three dots and select Settings.Select Advanced to show the advanced settings. Select Content settings.Select Cookies.Click the garbage can icon to delete the cookies.

  • Click on the three lines and select OptionsSelect the Privacy & Security tab and click Manage Data found under Cookies and Site Data.Select fdu.edu and select Remove Selected, select Save Changes when finished.

  • Open Safari Preferences and select the Privacy tab.Select Manage Website DataSelect fdu.edu and click Remove.

  • Click on the Settings “Gear” located on the top right of the browser, select Internet OptionsDelete in the Browser History sectionUncheck all boxes listed, except Cookies and website data, click Delete when finished

Last Modified:

Email and File Encryption

Resources for:
icon Close

Virtru email encryption is the preferred method to send and view encrypted emails and files with your FDU email address. Available for FDU Faculty and Staff upon request. Click the link below to request access to Virtru Email Encryption.

The Virtru Email Encryption Tutorial will help users navigate installation, basic use, different usage scenarios, and common technical questions.

Alternative Approved Methods for Encryption

If you are not approved for Virtru email encryption, the articles below are alternative, FDU OIRT and DSIRT approved methods for encrypting Microsoft Office and Adobe PDF files and comply with the University WISP.

Warning Warning

According to FDU’s Written Information Security Program (WISP), in no case should they be sending or storing WISP protected information without the explicit authorization of the Chief Information Security Officer (CISO). If approved, these instructions will provide you with guidance on the methodology.

For more information, visit the link at the bottom of the page.

Last Modified:
Staff Directory
Allen McDaniel Computing Services Senior Instructional and Technical Support Technician
Lisa Stadler-Kay Computing Services Asset Manager
Miguel De-Los Santos Computing Services PC Support Specialist
Peter Mannarino Computing Services Director of Computing Services
Ralph Knapp Computing Services Systems Engineer