icon

University Systems and Networking

University Systems and Networking (USAN) oversees the University's Data Centers and Wired / Wireless Network. We support both the Metropolitan and Florham campuses, as well as our international campuses in Vancouver and Wroxton. USAN enables the access, flow and storage of information within the University while defending our network against all threats and maintaining the integrity of our data.

Help Desk
background
Search Department Resources

Office 365 Training Guide

Resources for:
icon Close

Introduction to Office365

Fairleigh Dickinson University uses Office365, a new E-mail system that greatly expands the quota of data stored per user and features enhanced services such as Word Online, Excel online and PowerPoint online. Office365 service can be accessed via office365.fdu.edu from a web browser, or a configured mail client such as Outlook or Thunderbird.

The manual available for download below is intended to assist users with an FDU email address and non-FDU issued equipment to migrate their e-mail account to Office365.

Last Modified:

Operating System Support Lifecycle

Resources for:
icon Close

Fairleigh Dickinson University’s Acceptable Use Policy for Computer Usage states, “All computers and mobile devices accessing any FDU resource must run an operating system and configuration that is supported by its vendor with regard to security patches and updates.”

This guide defines the lifecycle of our support for different operating systems.

Note

Apple does not publish official End of Life dates, but typically provides security updates for the current release of macOS, as well as the previous two releases.

Support Status Descriptions

Active (Default) This platform is supported by FDU Computer Services & University Systems and Networking and new machines will be built with this platform unless otherwise requested.
Active This platform is supported by FDU Computer Services & University Systems and Networking and will be installed on request.
Containment This platform is currently supported by FDU Computer Services & University Systems and Networking but no new machines will be built with this platform. Platforms in containment will receive security updates and patches for the FDU supported software components. FDU Computer Services & University Systems and Networking Facilities will not provide new software or major revisions to existing software for these platforms.
Phasing Out FDU Computer Services & University Systems and Networking is actively working to migrate assets away from this platform. Platforms go in to this status automatically 6 months before the FDU End of Support Date. Platforms may be placed in this status before that time.
EOL This platform is no longer supported by FDU Computer Services & University Systems and Networking. Software support will be dropped from any asset running this platform. Other levels of support may be dropped as circumstances warrant. A valid reason is required to maintain an asset running this platform past the End of FDU Support date. All exceptions must be logged and periodically reviewed.

Supported Operating Systems

OS Family Operating System Latest Release FDU Support Status Vendor Release Date Start of FDU Support End of FDU Support Latest Vendor EOL Date
Windows Desktop Windows 11 23H2 Active (Default) Oct-2023 Jul-2024 Oct-2026 Nov-2026
22H2 Phasing Out Sep-2022 Jul-2023 Jul-2024 Oct-2025
Windows 10 22H2 Containment Oct-2022 Dec-2022 May-2025 Oct-2025
21H2 Phasing Out Nov-2021 Jan-2022 May-2024 Jun-2024
Apple
Devices
macOS Sonoma 14 Active (Default) Sep-2023 Nov-2023 Jun-2026 ~2026
macOS Ventura 13 Containment Oct-2022 Dec-2022 Jun-2025 ~2025
macOS Monterey 12 Phasing Out Oct-2021 Dec-2021 Jun-2024 ~2024

Latest Release

The latest release for desktop operating systems includes all minor and incremental updates.

End of Life

Any operating system not listed above is considered EOL (End of Life) and will not be supported. Examples of EOL Operating Systems include:

Windows: 95,98, XP, ME, VISTA, 7 & 8
macOS: Yosemite, El Capitan, Sierra, High Sierra, Mojave, Catalina, & Big Sur

Last Modified:

Policy for Acceptable Use of Email

Resources for:
icon Close

As a member of our community, your FDU NetID is your passport to accessing many of Fairleigh Dickinson University’s IT services. Most important is your student, employee, or alumni FDU Email account. When using FDU Email, you are an ambassador for our institution and we expect that you will conduct yourself in an efficient, effective, ethical, and lawful manner. Please review our Policy for Acceptable Use of Email to ensure that you are adhering to all security and decorum requirements.

Effective Date: 08/01/2024
Last Revision Date: 08/01/2018

1.0 Introduction

The purpose of this policy is to ensure the proper use of e-mail by all those assigned a Fairleigh Dickinson University (FDU) e-mail account. This policy applies to any e-mail system that FDU has or may install in the future. It also applies to employee use of personal e-mail accounts via browsers, as directed below. All users of FDU e-mail systems have the responsibility to use their e-mail in an efficient, effective, ethical and lawful manner. E-mail users must follow the same code of conduct expected in any other form of written or face-to-face business communication. FDU may supplement or modify this policy for specific employees in certain roles. This policy complements similar FDU policies such as the Acceptable Use Policy and the Written Information Security Program (WISP). Please read and follow those policies as well.

The University subscribes to the 1940 Statement of Principles on Academic Freedom and Tenure and the 1940 and 1970 Interpretive Comments issued thereon, formulated jointly by the Association of American Colleges and the American Association of University Professors. Nothing in this policy is intended to supersede those statements and principles.

2.0 Ownership of Email Data

The University owns all University email accounts in the fdu.edu domain, or any subsequent domains it may create (University Email Accounts). Subject to underlying copyright and other intellectual property rights under applicable laws and University policies, the University also owns data transmitted or stored using the University Email Accounts.

3.0 Employee Responsibilities

FDU only supports the installation and usage of approved e-mail clients.

Usernames will be assigned as part of the University’s e-mail registration process and reflect internally mandated e-mail naming conventions.

Email is the primary means of official communication for Fairleigh Dickinson University. All employees, full-time and part-time, are responsible to check their @FDU.edu email accounts regularly for communication from students, faculty, staff, and administrators.

Further, all FDU employees, including faculty, full-time and part-time, are required to use their @FDU.edu email account for all University-related correspondence except in such situations when Office365.fdu.edu is unavailable.

3.1 Acceptable Uses

  • Communicating in a professional manner with other FDU associates about work-related matters.
  • Communicating in a professional manner with parties outside FDU for business purposes.
  • Personal communications that are brief and do not interfere with work responsibilities.
  • Users are allowed to access personal e-mail accounts on a limited basis, without disrupting business responsibilities. Access can be gained only by using a browser. Use of e-mail-specific protocols, such as POP3 and IMAP4, is prohibited, since they require specific firewall ports to be open.
  • Electronic messages are frequently inadequate in conveying mood and context. Users should carefully consider how the recipient might interpret a message before composing or sending the message.

3.2 Unacceptable Uses

  • Creating and exchanging messages that can be interpreted as harassing, obscene, racist, sexist, ageist, pornographic, or threatening, as defined by University policies.
  • Creating and exchanging information that is in violation of copyright or any other law. FDU is not responsible for an associate’s use of e-mail that breaks laws.
  • Personal communication that interferes with work responsibilities.
  • Opening file attachments from an unknown or untrustworthy source, or with a suspicious or unexpected subject line.
  • Sending unprotected healthcare data and personally identifiable consumer data or other confidential information to unauthorized people or in violation of FDU’s Acceptable Use Policy, or the Written Information Security Program (WISP). , Health Insurance Portability and Accountability Act and/or Gramm-Leach-Bliley Act regulations. Exceptions may be authorized by the University Chief Information Security Officer working with the employee’s supervisor. Communications that strain FDU’s network or other systems unduly, such as sending large files to large distribution lists.
  • Communications to distribution lists of only marginal interest to members, and replying to the entire distribution list when a personal reply is effective.
  • Communications with non-specific subject lines, inarticulate language, and without clear purpose.
  • Auto-forwarding e-mail messages from your University e-mail account.
  • Using any e-mail system, other than FDU’s e-mail system, for FDU-related communications.
  • Circulating chain letters and/or commercial offerings.
  • Circulating unprotected healthcare data and personally identifiable consumer data that would violate U.S. Federal HIPAA and GLB regulations. Exceptions may be authorized by the employee’s supervisor and in conjunction with the use of a University-approved e-mail encryption service.
  • Altering or forging the “From” line or any other attribution of origin contained in electronic mail or postings.
  • Using any of the University systems for sending what is commonly referred to as “SPAM” mail (unsolicited bulk email)

4.0 Student Responsibilities

Email is the primary means of official communication for Fairleigh Dickinson University. All students are responsible to check their FDU.edu email accounts regularly for communication from faculty, staff, and administrators.

FDU students are required to use their FDU.edu email account for all University-related correspondence except in such situations when Office365.fdu.edu is unavailable.

4.1 Acceptable Uses

  • Communicating in a professional manner.
  • Electronic messages are frequently inadequate in conveying mood and context. Users should carefully consider how the recipient might interpret a message before composing or sending the message.

4.1 Unacceptable Uses

  • Creating and exchanging messages that can be interpreted as harassing, obscene, racist, sexist, ageist, pornographic or threatening, as defined by University policies.
  • Creating and exchanging information that is in violation of copyright or any other law. FDU is not responsible for an individuals use of e-mail that breaks laws.
  • Opening file attachments from an unknown or untrustworthy source, or with a suspicious or unexpected subject line.
  • Auto-forwarding e-mail messages from your University e-mail account.
  • Using any e-mail system, other than FDU’s e-mail system, for FDU-related communications.
  • Circulating chain letters and/or commercial offerings.
  • Altering or forging the “From” line or any other attribution of origin contained in electronic mail or postings.
  • Using any of the University systems for sending what is commonly referred to as “SPAM” mail (unsolicited bulk email)
  • Use of e-mail-specific protocols such as POP3 and IMAP4 for access to non-FDU email accounts is prohibited since they require specific firewall ports to be open.

5.0 Privacy Guidelines

The University typically does not review the content of electronic messages or other data, files, or records generated, stored, or maintained on its electronic information resources; however, it retains the right to inspect, review, or retain the content of such messages, data, files, and records at any time without prior notification. Any such action will be taken for reasons the University, within its discretion, deems to be legitimate. These legitimate reasons may include, but are not limited to,

  • responding to lawful subpoenas or court orders;
  • investigating misconduct (including research misconduct);
  • determining compliance with University policies and the law; and
  • locating electronic messages, data, files, or other records related to these purposes.

FDU maintains the right to monitor and review e-mail activity to ensure compliance with this policy, as well as to fulfill FDU’s responsibilities under the laws and regulations of the jurisdictions in which it operates. Users should have no expectation of privacy.

  • Except as otherwise stipulated in this policy, on termination or separation from FDU, FDU will immediately deny access to e-mail, including the ability to download, forward, print or retrieve any message stored in the system, regardless of sender or recipient.
  • Except as otherwise stipulated in this policy, employees who leave FDU will have their mailbox deleted within six months of their termination date. The employee’s manager may request that access be given to another employee who may remove any needed information within the same six month time frame.
  • FDU reserves the right to intercept, monitor, review and/or disclose any and all messages composed, sent or received on the University e-mail system. Intercepting, monitoring and reviewing of messages may be performed with the assistance of content filtering software, or by designated FDU employees and/or designated external entities. Employees designated to review messages may include, but are not limited to, an employee’s supervisor or manager and/or representatives from the HR, legal or compliance departments.
  • FDU reserves the right to alter, modify, re-route or block the delivery of messages as appropriate. This includes but is not limited to:
    • Rejecting, quarantining or removing attachments and/or malicious code from messages that may pose a threat to FDU resources.
    • Rejecting or quarantining messages with suspicious content.
    • Rejecting or quarantining messages containing offensive language or topics.
    • Re-routing messages with suspicious content to designated FDU employees for manual review.
    • Appending legal disclaimers to messages.
  • Electronic messages are legally discoverable and permissible as evidence in a court of law.
  • Users of the University’s computing and electronic communications resources must understand that electronic messages, data, files, and other records generated, stored, or maintained on University electronic information resources may be electronically accessed, reconstructed, or retrieved by the University even after they have been deleted.

6.0 Security

As with any other type of software that runs over a network, e-mail users have the responsibility to follow sound security practices.

  • Users should not use the e-mail system to transfer sensitive data, except in accordance with FDU data protection policies. Refer to the Written Information Security Program (WISP). Sensitive data passed via e-mail over the Internet could be read by parties other than the intended recipients, particularly if it is clear text. Malicious third parties could potentially intercept and manipulate e-mail traffic.
  • In an effort to combat propagation of e-mail viruses, certain attachment types may be stripped at the University e-mail gateway. Recipients will be notified via e-mail when this occurs. Should this create a business hardship, users should contact the University Technical Assistance Center (UTAC).
  • Attachments can contain viruses and other malware. User should only open attachments from known and trusted correspondents. Suspicious attachments should be reported to the University Technical Assistance Center (UTAC).
  • Spam is automatically filtered at the University gateway in a highly efficient manner. Errors, whereby legitimate e-mail can be filtered as spam, while rare, can occur. If business-related mail messages are not delivered, users should check their local spam folder or the daily spam digest. If the message is not there, users should contact University Technical Assistance Center (UTAC).
  • Users will not be asked by OIRT or any other FDU group by e-mail for personal information such as usernames or passwords. Any such requests should not be responded to and should be referred to the University Technical Assistance Center (UTAC). Such approaches – known as phishing – are fraudulent approaches carried out for the purpose of unlawful exploitation.

7.0 Operational Guidelines

FDU employs certain practices and procedures in order to maintain the health and efficiency of electronic messaging resources, to achieve FDU objectives and/or to meet various regulations. These practices and procedures are subject to change, as appropriate or required under the circumstances.

  • For ongoing operations, audits, legal actions, or any other known purpose, FDU saves a copy of every e-mail message and attachment(s) to a secure location, where it can be protected and stored for three years. Recovery of messages from this store is prohibited for all but legal reasons.
  • To deliver mail in a timely and efficient manner, message size must be less than 25MB. Messages larger than 25MB will be automatically blocked and users will be notified of non-delivery. Should this create a business hardship, users should contact the University Technical Assistance Center (UTAC)
  • For all employees who handle sensitive information on a regular basis, to aid with ensuring that any accidental misdirection of emails are properly handled, the following disclaimer should be placed as part of and at the end of their signature block for all internal and external outbound emails.
    • This message and any attached documents contain information that may be confidential and privileged. If you have received this message in error, please immediately notify the sender and delete the message from your system without forwarding it to any other person.

Access to the content of electronic mail, data, files, or other records generated, stored, or maintained by any user may be requested from the University’s Associate Vice President of Technology Infrastructure for the reasons set forth below and shall be authorized as follows:

  1. by the Associate Vice President of Human Resources for all University employees;
  2. by either Dean of Students for students; or
  3. by the General Counsel for the purposes of complying with legal process and requirements or to preserve user electronic information for possible subsequent access in accordance with this policy.

In all cases, the Office of the General Counsel must be consulted prior to making a decision on whether to grant access. In the case of a time-critical matter, if the authorizing official is unavailable for a timely response, the General Counsel may authorize access.

All full-time faculty who retire from the University may keep their email address for life if they request to do so.

All full-time faculty who leave the University for reasons other than termination for cause, may request email forwarding for up to six months.

8.0 Governance and Enforcement

This policy was created with input from the University’s Data Security Incidence Response Team (DSIRT). At the request of the University’s Chief Information Security Officer (CISO), the DSIRT will review this policy annually to ensure that FDU is in compliance with internal or external requirements. FDU faces liability if users violate the terms of this policy. Therefore, willful or repeated violations of this Acceptable Use Policy for e-mail can result in informal or formal warnings, the loss of e-mail privileges, and other sanctions including termination. Any such discipline shall be in accordance with processes and procedures of Human Resources and subject to any protections afforded under the University’s agreement with “Office & Professional Employees International Union”, the “Faculty Handbook”, and similar documents. Third parties who violate this Policy may have their relationship with the University terminated and their access to campus restricted.

For assistance with this policy, please contact the University’s Chief Information Security Officer (CISO).

Exceptions to this policy may be authorized by the University Chief Information Security Officer working with the employee’s supervisor.

Policy violations should be reported immediately to the University’s Associate Vice President of Technology Infrastructure

The University reserves the right to suspend an e-mail account while investigating a complaint or troubleshooting a system or network problem.

This document will be reviewed semi-annually and is available both electronically and in printed form at each of the Campus Computing Centers.

It is the user’s responsibility to remain informed about the contents of this document.

Other Related and Applicable Policies


Last Modified:

Printing at Home while Connected to FDU VPN

Resources for:
icon Close

Issue

When I am connected to the FDU VPN or Cisco AnyConnect Adapter, I am unable to print documents while working from home.

Cause

While connected to the FDU VPN network, you are unable to access any local printers or network devices / services to help protect your computer from various threats while working outside of the FDU Campus Network.

Resolution

In order to Print, please disconnect from the VPN client, and once your documents have printed, reconnect.

Tip

Print jobs will continue to queue while you’re connected to the FDU VPN and will print when you disconnect from the VPN.

You can also connect a USB cable from the printer to your laptop, where available, and you can remain on the FDU VPN and print anything you need.

Last Modified:

Reporting Phishing or Junk Emails

Resources for:
icon Close
Outlook Web Access (Office365.fdu.edu)
  1. Click on the email that you would like to Mark as Junk or Mark as Phishing
  1. Click the down arrow next to the Junk button
  1. Click on the appropriate button to report the email (Junk, Phishing or Block)
  1. Once you report the email, a copy of the email is automatically sent to the FDU University Systems team and Microsoft for review to improve the spams going forward
close
Microsoft Outlook for Windows or Mac
  1. Click on the email that you would like to Mark as Junk or Mark as Phishing
  1. Click on the Report Message button
  1. Click the appropriate option button (Junk or Phishing)
  1. Once you report the email, a copy of the email is automatically sent to the FDU University Systems team and Microsoft for review to improve the spams going forward
close
Last Modified:

Safeguard Rules Under The Gramm-Leach-Bliley Act

Resources for:
icon Close

Responsible Office: Data Security Incident Response Team (DSIRT)
Responsible Official: Chief Information Officer, Chief Information Security Officer
DSIRT Approval: Neal M. Sturm on behalf of DSIRT

Effective Date: 12/01/2022
Last Review Date: 11/22/2022
Last Revision Date: 11/22/2022


  1. Purpose: This Policy sets the standards for developing, implementing, and maintaining reasonable administrative, technical, and physical safeguards to protect the security, confidentiality, and integrity of information covered by applicable provisions of the Gramm-Leach-Bliley Act (“GLBA”) and associated regulations. In particular, this document describes various measures being taken by FDU to (i) ensure the security and confidentiality of covered information, (ii) protect against any anticipated threats or hazards to the security of these records, and (iii) protect against the unauthorized access or use of such records or information in ways that could result in substantial harm or inconvenience (collectively, the “Program”). The practices described in this Policy are in addition to any institutional policies and procedures that may be required pursuant to other federal and state laws and regulations, including, without limitation, the Family Educational Rights and Privacy Act (“FERPA”).
  1. Scope of Program: The Program applies to any record containing “nonpublic personal information” about a student or other individual who has a continuing relationship with the University, whether the record is in paper, electronic, or other form, and which is handled or maintained by or on behalf of the University (“covered information”).(1) This includes any information that a student or other individual provides to FDU in connection with financial aid and tuition/fee collection efforts.

(1) Nonpublic personal information means: (i) personally identifiable financial information; and (ii) any list, description, or other grouping of consumers (and publicly available information pertaining to them) that is derived using any personally identifiable financial information that is not publicly available. “Personally identifiable financial information” means any information that a consumer provides to FDU to obtain a financial product or service, any information about a consumer resulting from a transaction involving a financial product or service between FDU and that consumer, or information that FDU otherwise obtains about a consumer in connection with the provision of a financial product or service to that consumer. A “consumer” is an individual, including a student, who obtains or has obtained a financial product or service from FDU that is to be used primarily for personal, family, or household purposes, or that individual’s legal representative. Examples include information an individual provides to FDU on an application for financial aid, account balance information and payment history, the fact that a student has received financial aid from FDU, and any information that FDU collects through an internet “cookie” in connection with a financial product or service.

  1. Roles and Responsibilities: Compliance and cooperation with this Policy is the responsibility of every employee at all levels within FDU. FDU’s Vice President and Chief Information Officer (CIO), assisted by the Chief Information Security Officer (the “CISO”), has the overall responsibility for coordinating information security pursuant to this Policy. The CIO or CISO may designate other representatives of FDU to help oversee and coordinate particular elements of the Program. The team will work closely with other members of the Office of Information Resources and Technology (OIRT), the Data Security & Incident Response Team (“DSIRT”), the University Risk Manager, the Vice President for Human Resources, and the General Counsel, as well as relevant academic and administrative units throughout the University to implement the Program.
  1. Risk Assessment: The CIO and CISO will help the relevant offices of FDU to identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of covered information that could result in the unauthorized disclosure, misuse, alteration, destruction, or other compromise of the information; and to assess the sufficiency of the safeguards in place to controls these risks. This effort will be embodied in a risk assessment document.

    The risk assessment is a written document that includes:

    (i) Criteria for the evaluation and categorization of identified security risks or threats that FDU faces;

    (ii) Criteria for the assessment of the confidentiality, integrity, and availability of FDU’s information systems and covered information, including the adequacy of the existing controls in the context of the identified risks or threats that FDU faces; and

    (iii) Requirements describing how identified risks will be mitigated or accepted based on the risk assessment and how the information security program will address the risks.
  1. Access Controls: The Program includes implementing and periodically reviewing access controls, including technical and, as appropriate, physical controls to:

    (i) Authenticate and permit access only to authorized users to protect against the unauthorized acquisition of covered information; and

    (ii) Limit authorized users’ access only to covered information that they need to perform their duties and functions, or, in the case of third parties, to access their own information.

The Program is designed to identify and help manage safeguards for the data, personnel, devices, systems, and facilities that enable FDU to achieve its mission – efforts are prioritized in accordance with our objectives and risk strategy.

FDU has adopted authentication and access controls as needed to implement the “principle of least privilege” around accessing covered data, meaning that no user should have access greater than is necessary for legitimate FDU purposes Data owners within each applicable University unit approve and periodically review access. This includes a periodic review by the Office of Enrollment Services of all users who have access to Enrollment Services security tracks in the Colleague System and a periodic review by other administrative departments that maintain students’ financial aid information regarding user access to the information.

These efforts also include employee training regarding these controls. The OIRT will coordinate with representatives in FDU’s Office of Finance, Office of Financial Aid, Enrollment Services and other offices to evaluate on a regular basis the effectiveness of the University’s training, procedures, and practices relating to access to and use of student records, including financial aid information as well as financial information. This evaluation will include assessing the effectiveness of the University’s current policies and procedures in this area. All employees are required to train in FDU’s Written Information Security Program (WISP) (training.fdu.edu), which program is incorporated by reference into this Policy.

  1. Monitoring Unauthorized Users and Use: FDU has implemented policies, procedures, and controls designed to monitor and log the activity of authorized users and detect unauthorized access or use of, tampering with, covered information. Various specific measures are identified in Appendix 1.

    These measures will include assessing the University’s current policies and procedures relating to FDU’s Acceptable Use Policy for Computer Usage, Confidentiality Agreement and Security Policy, FDU Procedure on Handling Data on Separating Employees, Password Policy, Policy for Acceptable Use of Email, Software Compliance & Distribution Policy, and Written Information Security Program. The CISO will also coordinate with the CIO and the OIRT to assess procedures for monitoring potential information security threats associated with software systems and for updating such systems by, among other things, implementing patches or other software fixes designed to deal with known security flaws.
  1. Monitoring the Effectiveness of Safeguards: FDU periodically conducts penetration tests and vulnerability assessments on its network and key information systems. These measures are designed to test and monitor the effectiveness of the safeguards’ key controls, systems, and procedures, including those to detect actual and attempted attacks on, or intrusions into, FDU’s information systems.

    For those systems where continuous monitoring (or other methods to detect, on an ongoing basis, changes in information systems that may create vulnerabilities), is not practical, FDU will conduct:

    (i) Annual penetration testing on FDU’s information systems identified by OIRT based on relevant identified risks under the risk assessment; and

    (ii) Vulnerability assessments of FDU’s information systems, including systemic scans or reviews of information systems designed to identify publicly known security vulnerabilities in FDU’s information systems based on the risk assessment, at least every six months; and whenever there are material changes to FDU’s operations or business arrangements; and whenever there are circumstances that OIRT knows (or has reason to know) may have a material impact on FDU’s information security program.
  1. Detecting, Preventing and Responding to Attacks: The OIRT and University Risk Manager will on a regular basis evaluate procedures for and methods of detecting, preventing, and responding to attacks or other system failures and existing network access and security policies and procedures, as well as procedures for coordinating responses to network attacks and developing incident response teams and policies. The FDU Data Security Incident & Response Team implements all aspects of, oversees other Departments’ adherence to, and documents all incident response activities. Upon determination by the CISO and General Counsel that a Security Incident triggers breach notification laws, the University will report the breach to relevant federal or state regulatory authorities by their designated methods; and, where applicable, the U.S. Department of Education, including details about date of breach (suspected or known); impact of breach (e.g. number of records); method of breach (e.g. hack, accidental disclosure); information security program point of contact – email and phone details; remediation status (e.g. complete, in process); and next steps (as needed).

    These measures will be documented in a comprehensive incident response plan that addresses:

    (i) The goals of the incident response plan;

    (ii) The internal processes for responding to a security event;

    (iii) The definition of clear roles, responsibilities, and levels of decision-making authority;

    (iv) External and internal communications and information sharing;

    (v) Identification of requirements for the remediation of any identified weaknesses in information systems and associated controls;

    (vi) Documentation and reporting regarding security events and related incident response activities; and

    (vii) The evaluation and revision as necessary of the incident response plan following a security event.
  1. Overseeing In-House Developed Applications and External Service Providers: The OIRT leadership working in collaboration with the CISO will help ensure that software applications and solutions developed in-house by FDU, including modifications to third-party programs, meet the safeguard standards of this Policy. The CIO, CISO and other appropriate OIRT leaders will also coordinate with FDU’s contract review teams to raise awareness of, and to institute methods for, selecting and retaining only those service providers that can maintain appropriate safeguards for nonpublic financial information of students and other third parties to which they will have access. In addition, the CIO and CISO will work with the General Counsel and the University Risk Manager to develop and incorporate standard, contractual protections applicable to third-party service providers, which will require the providers to implement and maintain appropriate safeguards.

    Utilizing a variety of automated risk assessment tools such as Bitsight, OIRT periodically assesses FDU’s service providers on the risk they present and the continued adequacy of their safeguards.
  1. Encryption: FDU adopts methods to protect by encryption covered information held or transmitted by the University by encrypting both in transit over external networks and at rest. To the extent that encryption of covered information, either in transit over external networks or at rest, is infeasible, FDU secures the covered information using effective alternative compensating controls reviewed and approved by the CISO.
  1. Multifactor authentication: FDU has implemented multi-factor authentication for any individual accessing the University’s information systems, except where the CISO has approved in writing the use of reasonably equivalent or more secure access controls.

    Multi-factor authentication is defined as authentication through verification of at least two of the following types of authentication factors:

    (1) Knowledge factors, such as a password;

    (2) Possession factors, such as a token; or

    (3) Inherence factors, such as biometric characteristics.
  1. Data Retention and Disposal Controls: FDU has in place procedures for the secure disposal of covered information in any format, consistent with the University’s operations and other legitimate business purposes, except where required to be retained by law or regulation, or where targeted disposal is not reasonably feasible due to the manner in which the information is maintained. Where information is not needed to be retained, the University will take reasonable measures to include processes for disposal of covered information no later than two years after the last date the information is used for legitimate University purposes. The Program includes periodic review of our data retention policy to minimize the unnecessary retention of data.
  1. Adjustments to Program: Risk assessment activities will be periodically performed to reexamine the reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of covered information that could result in the unauthorized disclosure, misuse, alteration, destruction, or other compromise of such information, and to reassess the sufficiency of any safeguards in place to control these risks. The CISO is responsible for evaluating and recommending adjustments to the program based on the undertaken risk identification and assessment activities, as well as any material changes to FDU’s operations or other circumstances that may have a material impact on the Program.
  1. Reports to the Board: The Vice President of OIRT will submit written reports to the Board of Trustees at least once each calendar year. The report will include the following information:

    (1) The overall status of the Program and FDU’s compliance with the safeguard requirements under the GLBA;

    (2) Material matters related to the Program, addressing issues such as risk assessment, risk management and control decisions, service provider arrangements, results of testing, security events or violations and management’s responses thereto, and recommendations for changes in the information security program.

The CIO may approve deviations to the processes set forth in this Policy to meet changing conditions at the University, so long as such deviations are designed to achieve the safeguard goals set forth in this Policy and do not violate the GLBA and other applicable laws.

Appendix 1
Certain Additional Specific Safeguards

Periodically (generally at least once each year), leaders from applicable University departments and units are surveyed regarding their processes for safeguarding covered information, using a standard template. Results are compiled and conveyed to the CIO for review and follow-up, including adopting and incorporating results in the University-wide Risk Assessment.

The CIO will determine which departments and units should receive the assessment survey, based on their handling of covered information. Currently, the units are: OIRT, Office of Enrollment Services, Credits and Collections, Admissions, International Admissions, Financial Aid, Veteran Services, Accounts Payable, Management Information Systems, Conference & Summer Programs, School of Pharmacy, and the Controller’s Office.

The standard assessment template is as follows.

  1. Designate an employee or employees to coordinate the unit’s information security program.
  2. Identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of customer information that could result in the unauthorized disclosure, misuse, alteration, destruction or other compromise of such information, and assess the sufficiency of any safeguards in place to control these risks. At a minimum, such a risk assessment should include consideration of risks in each relevant area of your operations, including:
  • Unauthorized disclosure of sensitive information by employees through intentional or unintentional methods.
  • Unauthorized access, disclosure, misuse, alteration or destruction of information on hosts.
  • Detection and prevention of attacks on the systems.
  • Unsecured transmission of data.
  • Physical security of computer systems, network equipment, backups and paper materials.
  • Managing data integrity and system failures.
  1. Design and implement information safeguards to control the risks you identify through risk assessment, and regularly test or otherwise monitor the effectiveness of the safeguards’ key controls, systems, and procedures.
  1. Unauthorized disclosure of sensitive information by employees through intentional or unintentional methods:
  2. Unauthorized access, disclosure, misuse, alteration or destruction of information on hosts:
  3. Detection and prevention of attacks on the systems:
  4. Unsecured transmission of data:
  5. Physical security of computer systems, network equipment, backups and paper materials:
  6. Managing data integrity and system failures:
  1. Oversee service providers, by: (1) Taking reasonable steps to select and retain service providers that are capable of maintaining appropriate safeguards for the customer information at issue; and (2) Requiring FDU’s service providers by contract to implement and maintain such safeguards.
  1. Evaluate and adjust FDU’s information security program in light of the results of the testing and monitoring required by this Policy; any material changes to FDU’s operations or business arrangements; or any other circumstances that are known or have reason to be known as having a material impact on FDU’s information security program.

The following is an example of a completed assessment survey, from OIRT:

Gramm Leach Bliley Security Program
Office of Information Resources Technology
Standards for Safeguarding Customer Information

(a) Designate an employee or employees to assist the CIO in the coordination of the Program.

In addition to the CISO, the Director of Systems and the Director of Networking are the designated employees for the Office of Information Resources Technology

(b) Identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of customer information that could result in the unauthorized disclosure, misuse, alteration, destruction or other compromise of such information, and assess the sufficiency of any safeguards in place to control these risks. At a minimum, such a risk assessment should include consideration of risks in each relevant area of your operations, including:

  • Unauthorized disclosure of sensitive information by employees through intentional or unintentional methods.
  • Unauthorized access, disclosure, misuse, alteration or destruction of information on hosts.
  • Detection and prevention of attacks on the systems.
  • Unsecured transmission of data.
  • Physical security of computer systems, network equipment, backups and paper materials.
  • Managing data integrity and system failures.

(c) Design and implement information safeguards to control the risks you identify through risk assessment, and regularly test or otherwise monitor the effectiveness of the safeguards’ key controls, systems, and procedures.

  1. Unauthorized disclosure of sensitive information by employees through intentional or unintentional methods:
  • Employees go through mandatory Written Information Security Program (WISP) Training
  • Prior to any IT requests, User Information Is checked against WISP to ensure they are current with training
  • Employees are provided training and are closely observed by managers before being given access to sensitive information. Training includes password policy and management, physical security of cabinets, storage, and equipment rooms, and recognizing fraudulent attempts to obtain sensitive information.
    • Policy, social engineering, keystrokes loggers, etc.
  • All employees must sign and accept the University’s “Acceptable Use Policy” and the “Confidentiality Agreement” if applicable.
  • Requests for sensitive information are directed to individuals with proper training and authority to review the request.
  • Potential employees are subjected to a background check before being hired by the University.
  • Updated IT Informational website that includes documentation of all policies and procedures specific to securing data.
  • Use of Data Loss Prevention tool to proactively monitor and correct non-compliance issues
  • Access to information is granted only to the extent required for the employee to perform their job functions.

2) Unauthorized access, disclosure, misuse, alteration or destruction of information on hosts:

  • Passwords are required for access to any system with sensitive information.
  • Strong password policies are in place where possible.
  • Multi-factor authentication to access sensitive systems for all faculty, adjuncts, staff and students.
  • Multi-factor authentication for all admin accounts.
  • Auditing systems (e.g. Change Management Process, Netwrix, Microsoft ATP) are used to track and report on changes to critical files.
  • Notifications of employee terminations are received prior to or on date of termination. Immediate notification is received when circumstances warrant instant suspension of access to systems.

3) Detection and prevention of attacks on the systems:

  • Auditing systems (e.g., Netwrix) are used to detect attempts to breach systems or alter system configurations.
  • System logs are reviewed daily for evidence of attacks.
  • Policies are in place to regularly apply patches to systems.
  • A firewall is in place for perimeter protection.
  • Obsolete systems are being replaced by newer systems that are better supported by hardware and software vendors. Most systems include host-based firewalls.
  • The wired portion of the university network is entirely switched to minimize the possibility of packet sniffing and other similar attacks.
  • WPA2 Enterprise is deployed and available for wireless accessible locations.
  • Endpoint protection software is in place, which automatically updates servers & clients.

4) Unsecured transmission of data:

  • Connections to all systems are using modern cryptographic techniques.
  • University standard practice is to use HTTPS for web services; all publicly accessible web traffic is proxied through load balancers.
  • SFTP is used to transmit data to various vendors securely.
  • EFax services deployed, ensuring fax transmission are encrypted both in transit and at rest.
  • Virtru software for encrypted email communication of sensitive and Personally Identifiable Information
  • 7-Zip is used to encrypt files being sent to and from vendors.

5) Physical security of computer systems, network equipment, backups and paper materials:

  • All computer systems and core network equipment are physically secured in locked rooms or cabinets.
  • Essential services are monitored for availability and alerts are sent when a system or service becomes unavailable.
  • Printed material with personal information is shredded when no longer needed.
  • The main datacenters and several ancillary MDF’s have heat and humidity detection systems as well as a fire suppression system.
  • Alarms with motion detectors are in place in all data centers. The university department of Public Safety monitors the alarms.
  • Security cameras are set and on 24 hour recording on both main data centers
  • A card access system controls access to the data centers and IT administrative offices.

6) Managing data integrity and system failures:

  • Daily backups of host systems are performed.
  • Network hardware configurations are backed up weekly.
  • Out of band capabilities exist to support network management and large-scale outages.
  • Continual off-site backup of all FDU owned workstations.
  • Mirroring of networked file services across campuses is occurring.
  • UPS systems provide backup power to central data centers.
  • Extending backup capabilities to include off-site backup of all University systems
  • A backup generator is in place for the main data centers.
  • A disaster recovery plan has been developed.

(d) Oversee service providers, by: (1) Taking reasonable steps to select and retain service providers that are capable of maintaining appropriate safeguards for the customer information at issue; and (2) Requiring FDU’s service providers by contract to implement and maintain such safeguards.

Contracts require appropriate safeguarding measures be taken by the vendor. Third Party Assessment evaluation using Industry best practice tools prior to executing contracts.

(e) Evaluate and adjust FDU’s information security program in light of the results of the testing and monitoring required by this Policy; any material changes to FDU’s operations or business arrangements; or any other circumstances that are known or have reason to be known as having a material impact on FDU’s information security program.

OIRT continually performs extensive reviews of applicable written policies and has a continuous program in place to review applicable policies and procedures.

OIRT periodically (generally annually) performs an eMail Phishing test to all full-time faculty and staff. FDU uses a third party as the tool for performing the test. Individuals who fail the Phishing test are required to complete remedial training with a passing score. Supervisors are made aware of those who fail the test and are encouraged to speak with their employees.

OIRT conducts comprehensive vulnerability assessments aligned to the NIST Risk Management Framework (RMF) that included external vulnerability scanning, penetration testing, netflow analysis of our IP ranges, review of IT and cybersecurity-specific and FDU-wide documentation, and dark web footprinting.

OIRT takes action to increase the cadence of monitoring and reacting to server, desktop and mobile device alerts, ensure compliance of website configurations and deploy security measures to ensure security of email system and reduce spoofing of emails.


Last Modified:

SAMI Support Public Request Form

Resources for:
icon Close

The SAMI Support portal requires a valid NetID and password, along with DUO multi-factor authentication, for access. Upon entry, users can create new tickets, review open or closed requests, and explore the IT Knowledgebase for solutions to common issues. Access the support portal using the button below:

SAMI Support Portal

If you need to open a request and cannot access SAMI Support for any of the reasons below, please complete this request form to contact the Fairleigh Dickinson University Technical Assistance Center (UTAC). A member of the IT support team will assist you via phone call or email.

  • I do not have a valid University issued NetID
  • I am not able to authenticate through DUO
  • I have not set up my DUO account
  • I am a vendor without a University issued NetID
  • I am an admitted student
  • I am a newly hired employee or adjunct
  • My FDU account is locked
  • I need my Net ID password reset and have already attempted to do that through identity.fdu.edu

Tip

The form below is not compatible with Dark Mode. For an optimal experience, disable Dark Mode either in your device’s system settings or directly from the FDU IT website menu bar.

SAMI Support Public Request

Last Modified:

Secure Deletion Steps for Personal Information

Resources for:
icon Close

Introduction

This document outlines the university approved process for securely deleting Personal Information (PI) and Protected Health Information (PHI) after the PI or PHI has been encrypted.

Prerequisite

Eraser Portable® Secure Data Remove software needs to be installed on your computer. Please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) to request the installation of this software. A member of USAN will assist with the installation and setup of the software.

Document Deletion Process

To securely delete an unencrypted version of a document that contain PI and/or PHI that has been encrypted, complete the following steps:

  1. Find the “Secure Deletion” shortcut folder on your computer desktop screen
  2. Cut and paste the unencrypted version of the file to be deleted into this folder
  3. Find the “Eraser Portable” shortcut folder on your computer desktop screen and click to open the folder
  4. Double Click on “EraserPortable.exe“. The screen below will appear
  5. Click on the Green Run arrow to erase the file securely
secure 1
  1. A dialogue box will appear
  1. Click “Yes
  2. When the deletion process completes, you will see a report appear
  1. You may check your “Secure Deletion” folder to see if all documents have been erased

Outlook E-mail Deletion Process

To securely remove emails which contain PI and PHI from your Outlook client, complete the following steps:

  1. Delete the email from your Inbox and/or Sent items folder
  2. Delete the email from your Deleted Items
  3. Go to “Recover Deleted Items
  4. Highlight Deleted Items Folder
  1. Then go to Folder > Recover Deleted Items
  1. Highlight email which requires permanent deleting and select “Purge Selected Items” and then click “OK“. Now message is permanently out of your email system
  1. Finally, click “OK” on the following screen
secure8
Last Modified:

Secure Encryption Steps for Personal Information

Resources for:
icon Close

This document outlines the University approved process for securely encrypting Personally Identifiable Information (PII).

Prerequisite

7Zip software needs to be installed on the end user’s computer. Please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) to request the installation of this software. If justification is needed, notify UTAC that 7Zip is needed to encrypt documents containing PII.

Process

Encrypting Files and Folders

To encrypt a single file, find the file in your directory (or where you have it saved).

  1. Right click on the document (do not open the document)
  2. On the drop down menu, Find 7zip
  3. Click “Add to archive…
  4. When 7zip opens, there are three (3) settings which need to be changed:
    • Archive Format = Select zip from drop down
    • Encryption Method = select AES-256 from drop down
    • Check “show password” and type in a password that the user creates
    • Click “OK
    • A 7Zip Archive with the encrypted document will now appear in your directory

NOTE: Do not utilize any password that you use to access internal systems. The password cannot be recovered if forgotten.

Editing Encrypted Files and Folders

When editing an encrypted file or folder, you must make sure that you leave the 7zip archive open. If you close the archive, you will be able to work on the document, but it will not save.

Opening an Encrypted File or Folder

To open an encrypted file or folder:

  1. Right click on the 7Zip archive
  2. On the drop down menu, find 7Zip
  3. Click on the first “Open archive”
  4. Click to open your document

Saving an Encrypted File or Folder

To save an encrypted file or folder:

  1. Save the document as normal
  2. Upon closing document, the 7Zip archive will prompt the user to save the changes
Last Modified:

Spot a Phishing Scam

Resources for:
icon Close

What is a phishing scam?

Phishing refers to the act of using a fraudulent identity and scenario to extract personal information or something else of value. Although phishing scams can occur over various mediums including text messages, phone calls, and social media, they are most frequently carried out via email.

Scammers have many means of acquiring bulk email addresses. Receiving a phishing attempt does not mean that your account has been singled out or has been compromised in any way.

Fairleigh Dickinson University’s email accounts employ Microsoft’s Advanced Threat Protection (ATP) which, in addition to traditional spam filtering, removes malware infected attachments and utilizes Safelinks to scan messages for malicious links. Additionally, we have appended the subject line of messages coming from outside of the FDU domain with the “[External]” tag. Although phishing can occasionally come from inside of our domain, messages with the external tag demand extra scrutiny.

Despite all of these efforts, keeping up with the latest scams is always a cat and mouse game. It is best practice to have a solid foundational knowledge of how these scams work.

Detecting a Phishing Scam

Although each phishing scam is unique, there are certain common traits which can serve as red flags. The most common “tell” is a sense of urgency. Generally, phishers would like for you to act promptly and without careful consideration. As a result, they will pepper their email with phrases such as “immediate action required” and “to avoid the immediate suspension of your account”.

Although an urgent tone is likely to be your first clue, there are plenty of other red flags that you will begin to notice over time. Many phishing attempts are poorly constructed emails. Incorrect spelling and grammatical errors are common. The message could contain a blank subject line and the sender’s signature may only list their title instead of their name. Be wary of messages in which the quality of writing does not meet your expectations for the purported institution.

The goal of many scams is to make a request for your personal information. This can take the form of bluntly asking for your social security number. However, it may also take a subtler approach. Many phishing attempts will create a mock version of a University, banking institution, or commerce website and ask you to log in. Once you enter your account information, the scammers have acquired your password.

Although most phishing scams cast a wide net, some recent attacks have specifically targeted individual members of the University. If someone is claiming to be your colleague or supervisor, check to confirm that the message is coming from their FDU account. Do not trust messages claiming to be from FDU employees which originate from external accounts such as Gmail and Yahoo.

Many of these personalized scams also have a very specific common thread. After a bit of conversation, the scammer will request that you purchase gift cards for common services such as iTunes, Google Play, or Amazon. No, your boss does not urgently require you to purchase gift cards out of pocket.

Also, beware of solicitations coming to your FDU email address from businesses offering deals or asking you to click on a banner to receive a promotion. Make sure that the email is coming from the domain of the company offering the sale or promotion.

What does a phishing scam look like?

Now that you know what to look for, let’s look at a sample phishing attempt:

Reporting a Phishing Scam

You can use your newfound expertise to assist the FDU community. When you see a message that you believe to be a phishing scam, please report it to us. Via Outlook this can be accomplished via our reporting tool. Please see Reporting Phishing or Junk Emails for more information. If you are using an alternative mail client such as Apple Mail, you can forward the suspected scam to phishing@fdu.edu.

How should I proceed if I have already replied to a Phishing Scam?

Please change any passwords that you have provided to the scammer. Once this is completed, please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) for further instructions.

Last Modified:
FAQ
  • An alias is an additional email address that will direct mail to your FDU email account. Creating an alias for your account can be a useful strategy. For instance, if you are spearheading a project, it may be easier to solicit replies to an address that contains the name of the project than it would be to garner responses to your existing email address. If this solution interests you, please fill out the Email Alias form.

  • Due to the cavernous email storage offered on the Office365 platform, there has been little to no demand for FDU staff and faculty members to request an increased mail quota. Office365 email provides enough capacity for even our most prolific users. However, if special circumstances make you the exception to this rule, you can request a quota increase by completing the Quota request form.

  • FDU’s Acceptable Use Policy prohibits running software that accepts incoming connections from other computers. Programs such as BitTorrent or other P2P file sharing hosting program all contain server components that allow others to connect to your computer and retrieve files from your system. In addition to the legal implications of sharing copyrighted materials, file sharing software creates a security concern. Improper use of these programs could result in the compromise of your private files and may leave your system open to attacks from other computers.

  • Phishing involves the use of e-mail messages that appear to come from your bank or another trusted business in an attempt to scam the user into surrendering private information that will be used for identity theft. The phishing e-mail typically ask you to click a link to visit a Web site, where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers

    Scammers have become increasingly sophisticated in creating fraudulent emails and Web sites that look authentic. These emails and Web sites often appear to be from legitimate companies and include images and logos of these organizations.

  • The Network ID (NetID) is a Windows Active Directory account uniquely assigned to each student, faculty & staff. It serves as your login to many computing and networking services including FDU Email.

  • FDU’s Opus is a Red Hat Linux based server. Opus provides an environment for FDU students, staff, and faculty to practice using software such as:

    • Expect
    • Gcc
    • Gzip
    • Aspell (Ispell replacement)
    • Java (Now 1.8.0_181)
    • Make
    • Ncurses
    • Tcl
    • Tcsh
    • Tcl/Tk
    • Strace (Trace)
    • Emacs
    • Bison
    • Nano (Formerly Pico)
    • Perl
    • LaTeX
    • A2ps
    • Links (Lynx Alternative)

    If you require access to Opus, please fill out the form.

  • In order to provide a safe and stable computing environment, the FDU-Wireless and FDU-Secure wireless networks require NetID authentication. However, in certain instances our students, staff and faculty members will need to work on campus with people from outside of our community. This can include vendors, contractors, visiting scholars, or even a visiting family member or friend. In these instances, the FDU community member can sponsor a guest for temporary wireless access.  The sponsor of a guest account will be responsible for the actions of his or her guest. Please ensure that your guest(s) follow FDU’s Acceptable Use Policy for Computer Usage

  • In order to provide a safe and secure network environment, FDU IT requires devices to authenticate to the FDU network before connecting. This works well for computing devices such as desktop computers, laptop computers, and mobile devices such as tablets and phones. Most other electronics, including gaming consoles and streaming video boxes, cannot properly authenticate to the network. In these instances, we ask you to register the device using the online form below. Please note that each user on our network is entitled to register up to 5 devices.

Anthony Licandro University Systems and Networking Manager
Atif Warriach University Systems and Networking Systems Administrator (Linux)
Basil Licop University Systems and Networking Office 365 Systems Administrator
Charles Ciccotto University Systems and Networking Operations Manager
Christopher Bland University Systems and Networking Systems Manager Lead
Christopher Robley University Systems and Networking Director of Systems
Cory Palacios Merino University Systems and Networking IT Assistant – Vancouver
Danovan Golding University Systems and Networking Senior System Technology Manager
Djeams Muse University Systems and Networking Network Analyst
Estref Resuli University Systems and Networking Technician Operations – Vancouver
Joshua Chan University Systems and Networking Systems Analyst
Juan Estrella University Systems and Networking Network Analyst
Juan Montufar University Systems and Networking Network Analyst
Karl Henry University Systems and Networking Senior Desktop Engineer
Kevin Atkinson University Systems and Networking Systems & Network Infrastructure Manager – Vancouver
Leslie McRae University Systems and Networking Operations Systems Analyst
Matt Gugel University Systems and Networking Senior Desktop Engineer
Michael Reekie University Systems and Networking Director
Rafael Alix University Systems and Networking Network Analyst
Shashi Patel University Systems and Networking Network Analyst
Stuart Alper University Systems and Networking Associate Vice President
Thomas Grassi University Systems and Networking Junior Systems Administrator
Torence Bobbitt University Systems and Networking User Support Helpdesk Technician
Vishal Gandhi University Systems and Networking Systems Analyst / Application Developer / Email Specialist