Resources

Search our resource library below to find helpful information. You can fitler by your role at FDU as well by department or service.

icon Open Support Request
Resources Header

icon No Results

Adjust your filter settings or refine your search phrase.

FDU-Secure uses current encryption standards to connect to the FDU wireless network via secure wireless traffic. This is an evolving technology and occasionally, one of the changes made by FDU IT requires us to issue a new certificate. When this occurs, you will need to accept the certificate using the process below.

Note

Your process may vary slightly based on the version of the Operating System that your device is using. Please contact the University Technical Assistance Center at (973)-443-8822 if you require further assistance.

How to Accept the New Certificate for FDU-Secure Wireless

Windows
  1. Login to your Windows 10 computer
  2. Go to the bottom right taskbar > Click on the “Networks” icon:
    • From the Networks list, select: “FDU-Secure
    • Click “Connect
  3. At the “Continue connection?” prompt, click “Connect
  1. Open your browser and test your Internet connection
close
macOS
  1. Login to your Mac computer
  2. Go to top right menu bar > Click “Wi-Fi” icon:
    • From the Wi-Fi list, select: “FDU-Secure
    • Click “Join
  3. At the “Authenticating to network FDU-Secure” prompt, click “Continue
  1. Click “OK
  2. Open your browser and test your Internet connection
close
iOS
  1. Login your iOS device (eg. iPhone)
  2. Go to your device’s Settings App > Select “Wi-Fi” > Select “FDU-Secure” > Click “Forget This Network
  3. Tap the “Back” button and select “Wi-Fi “once again to reload the available Wi-Fi networks:
    • From the Wi-Fi list, select: “FDU-Secure
    • Enter your complete FDU NetID as in the examples below: “username@fdu.edu, username@student.fdu.edu, username@alumni.fdu.edu”
    • Enter your FDU NetID Password
    • Click Join
  1. At the “Certificate” prompt, tap “Trust
  1. Open your browser and test your Internet connection
close
Android
  1. Login to your Android Device
  2. Open the “Settings” Application > Select “Wi-Fi” > Select the Gear icon next to FDU-Secure
  1. Select “Forget This Network
  1. Select FDU-Secure from the Wi-Fi menu
  1. Select “EAP method” and select “PEAP” from the dropdown menu
  2. Enter your complete FDU NetID and password
  3. In the “CA Certificate” field, select “Use System Certificates
  4. In the Domain field, enter fdu.edu
  5. Enable “Auto Reconnect
  6. Tap “Connect
  1. Open your browser and test your Internet connection
close
Last Modified: icon icon Copy Link

Acceptable Use Policy for Computer Usage

icon Close

The computing and electronic communications resources at Fairleigh Dickinson University support the instructional, research, and administrative activities of the University. Users of these facilities may have access to University resources, sensitive data, and external networks. Consequently, it is imperative for all users to behave in a responsible, ethical, and legal manner. This document presents specific guidelines to appropriate behavior and use of FDU computing resources.

SCOPE

These guidelines apply to all users of FDU computing resources. Users include all students, faculty, visiting faculty, staff, guests of the administration, and external individuals or organizations.

Computing resources include, but are not limited to, desktop and laptop computers, file servers, email and electronic communications, software, University-assigned email accounts, data storage, and networking equipment used to link these components together and to the Internet, whether owned, leased or rented by FDU. In addition, computing resources expressly include use of the University network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network. Moreover, this policy applies equally to all usage of University computing resources, whether that usage occurs through a University owned device or personal device.

University property, including computing resources, are provided to you in order to conduct University business. Although security protocols have been put in place to restrict access to computing resources in order to protect them against external parties or entities obtaining unauthorized access, employees should understand that these systems are intended for business use, and all computer resources are to be considered as University records.

Fairleigh Dickinson University is not responsible for the content of any material users prepare, receive or transmit. Thus, as a condition of using the University’s computer system, the user represents that he/she is in compliance with all federal, state and international copyright and other intellectual property laws and agreements and other federal and state laws, and that in his/her use of the system the user will not violate any federal or state civil or criminal laws. Furthermore, the user will indemnify, exonerate and hold the University, and its representatives, harmless from any claim, damage or cost related to the user’s use that is in violation of University policy(ies), including any legal fees the University decides it is necessary to incur to defend itself.

ACCEPTABLE USE

Those who make use of the FDU computing resources are required to behave in a manner consistent with FDU’s codes of conduct. As a user of this network, you agree to the following usage guidelines:

  1. You also shall not use an account not belonging to you. You will use only the computers, computer accounts and computer files for which you have authorization.
  2. You are responsible for any computer account you have been given. You shall set a password on the account that is in compliance with University password policies and you shall not share this password with other people. If you discover that someone has made unauthorized use of your account, you should change your password immediately and immediately report the event to one of the individuals listed in Appendix 1.
  3. You agree not to intentionally seek out information about, copy, or modify password files, other users’ files, or disks and tapes belonging to other people, whether at FDU or other facilities.
  4. You should not attempt to decrypt material to which you are not entitled or attempt to gain rights you have not been specifically granted by the owner. If you observe or discover a gap in system or network security, you agree to inform the one of the individuals listed in Appendix 1 and not to exploit the gap.
  5. You agree to refrain from any activity that interferes with a computer’s operating system or its logging and security systems, or that may cause such effects.
  6. You must be sensitive to the public nature of computing resources and agree not to transmit, post or otherwise display material that is threatening, obscene, harassing or defamatory. The use of University computing resources to libel, slander, or harass any other person is not allowed and could lead to University discipline as well as legal action by those who are the recipients of these actions.
  7. You agree not to make copies of or distribute software the University owns or uses under license, unless the owner of the software or the owner of the license has specifically granted permission to copy. If in doubt as to whether you have permission to copy software, assume you don’t.
  8. Messages, statements, and declarations sent as electronic mail or public postings should be treated as if they were tangible documents. From electronic identifiers used in the transmission of messages, addressees can see the University is the source of the message or its system is being used to transmit it, similar to how letterhead or return addresses on a tangible document would identify the University. SUGGESTION: Therefore, as a representative of the FDU community, you are expected to respect the University’s good name in your electronic dealings with those both within and outside the University. Moreover, in so far as employees make use of FDU computing resources to relay personal opinions, it is their obligation to make sure that no addressee can infer that their personal opinions are necessarily shared or authorized by the University, and they are obligated to clearly identify their opinions as their own and not those of the University.
  9. You agree not to create, alter, or delete any electronic information contained in any system that is not your own work.
  10. You agree not to create & send, or forward electronic chain mail letters. You agree not to attempt to alter or forge the “From” line or any other attribution of origin contained in electronic mail or postings. You agree not to use any of the University systems for sending what is commonly referred to as “SPAM” mail (unsolicited bulk email).
  11. You shall not use FDU computing resources as a means of obtaining unauthorized access to any other computing systems.
  12. FDU’s data storage, on University servers, hosted servers, third party storage or hosted storage, is an FDU computing resource with costs attached and should be used with care and discretion. It is not meant to be used for archiving programs and data not currently being used or for storage of files publicly available elsewhere. It is meant for current class work, research and development projects, business files and temporary storage of other files. Users shall attempt to keep their disk usage minimized and will refrain from maintaining duplicate copies of software already installed, or other files stored, on the system.
  13. Network addresses such as TCP/IP addresses and machine addresses are assigned by University Systems and Networking staff and may not be altered or otherwise assigned without the explicit permission of the Associate Vice President of Technology Infrastructure and CTO/CISO. In addition, no equipment may be attached to the network without the explicit permission of the the Associate Vice President of Technology Infrastructure and CTO/CISO.
  14. FDU’s computing resources are not to be used for the transmission of commercial or personal advertisements, solicitations, and promotions or for extended reproduction of political, ideological or commercial material originated by a person or organization. This includes but is not limited to the execution of revenue-generating advertising programs which pay users when the programs are run. The Associate Vice President of Technology Infrastructure and CTO/CISO may suspend this rule when it is in FDU’s best interest to permit such activity.
  15. Users may not contract with external Internet services, service providers or the like without the explicit approval of the Associate Vice President of Technology Infrastructure and CTO/CISO.
  16. Without the explicit permission of the Associate Vice President of Technology Infrastructure and CTO/CISO you agree not to run any of the following protocols or services:

    A. Port scanners, network monitors or other types of utilities that probe any other computer, be they inside or outside FDU’s network.
    B. Routing or network serving protocols such as RIP, IGRP, OOTP or DHCP on the network.
    C. Daemons, processes or programs that accept incoming connections, as a server would.
    D. Streaming media servers or any other server that broadcasts continuous data streams.
  17. FDU’s computing resources, including equipment,, network, services, and wiring may not be modified or extended beyond the areas of their intended use.
  18. Network connections may not be used to provide network access to anyone outside the University community or for any purposes other than those that are in direct support of the academic mission of the University.
  19. All computers connected to FDU’s network must run an operating system and configuration that is supported by its vendor with regard to security patches and updates, as well as antivirus software with current virus definitions. It is the user’s responsibility to keep their virus definitions up to date and to apply all critical operating system updates. For more information or questions email infosecurity@fdu.edu.
  20. Users may not alter the operating system or configuration of University owned computers without the explicit authorization of the Associate Vice President of Technology Infrastructure and CTO/CISO.

PERSONAL USE

Computing resources are created to support the instructional, research, and administrative activities of the University, and are the property of the University. Personal use of the University’s computing resources, except for students enrolled at the University , should be incidental and kept to a minimum. Use of such resources by an employee for other than work-related matters should be reasonable and limited so that it does not prevent the employee from attending to and completing work effectively and efficiently, does not incur additional cost to the University, and does not preclude others with work-related needs from using the resources, including the shared campus and Internet bandwidth.

Department Heads and other administrators may enact additional restrictions to further limit employees’ personal use of University computing resources. These restrictions may include but are not limited to: limiting time spent reading or writing personal email or visiting web pages, and limitations on acceptable content due to the possible exposure of screens to other individuals. Human Resources must be consulted, in advance, about any proposed restrictions.

SECURITY

Users should use any available methods to safeguard their data, including regular changes of passwords, making duplicates of files, and encrypting sensitive data. In the event that files have been corrupted as a result of intrusion, you should notify a system administrator immediately. Please note that FDU’s computing resources are not completely secure. It is possible that others will be able to access files by exploiting shortcomings in system security. For this and other reasons, FDU cannot assure confidentiality of files and other transmissions.

Information Systems and Technology (“IST”) and each of its departments attempt to provide reasonable security against damage to files stored on FDU’s computing resources by filtering all outgoing and incoming electronic mail for viruses and junk mail and making regular backups of systems. In connection with the University’s migration to Office 365, the University adopted a policy of retaining copy of each fdu.edu email for three (3) years. This means, regardless of individual user action, the University will maintain a copy of all email traffic for a period of 3 years.

In the event of lost or damaged files, a reasonable attempt will be made to recover the information; however, the University and the University Information Technology staff cannot guarantee recovery of the data or loss of data due to media failure, floods, fires, etc.

University Systems and Networking and each of its departments will make reasonable attempts to provide error-free hardware and software on our computing resources, however, it is not possible to guarantee this, and information provided by staff members is not guaranteed to be correct.

PRIVACY

Users should exercise caution when storing any confidential information in electronic format, because the privacy of such information cannot be guaranteed. User(s) must be aware that any personal files, including e-mail, maintained on University computing resources are University property and are subject to University storage, retrieval and review. Users of the University’s computing resources are hereby informed that they have no justified expectation of privacy in material processed, sent, or stored on or through the systems, and that the consent of the user to give access to his or her electronic documents is a condition precedent to the user’s use of University’s computer resources.

Even though the electronic data transmitted by or stored on University equipment is the property of the University, the IST staff will not normally log into another user account or access user’s files unless specifically granted permission by the user, or as otherwise permitted under this Policy. Student staff should avoid situations where helping another student or a faculty member would give them access to data relevant to a course that the student staff person is currently taking.

Exceptions to this practice are made under certain circumstances. These include: system backups, which access all files in a user’s account; software upgrades which may require editing startup files in a user’s account; diagnostic and trouble-shooting activities, which may, for example, require viewing the address headers of e-mail messages to determine the cause of problems; and keystroke monitoring of sessions to determine inappropriate use of the computing facilities. Another exception is a suspected violation of the tenets in this policy, the Student, Faculty, or Employee Handbooks, University employment policies, rules or practices or local, state or federal law, or as required by court order. In such situation(s), University computer resources in the possession of a user, or otherwise assigned to an individual, may be accessed, reviewed, duplicated and/or stored for later review by appropriate personnel without the user’s permission or knowledge.

Because employees are granted access to and use of FDU’s computing resources to conduct University business, the University reserves the right to access electronic mail messages left on or transmitted through the University’s computing resources. Employees should not assume that such messages are private and confidential or that the University or its designated representatives will not have a need to access and review this information. Individuals using the University’s computing resources should also have no expectation that any information stored on the University’s computing resources, whether the information is contained on a computer hard drive, computer disks, University or third party server or in any other manner, will be private.

In the event that user files need to be copied or viewed for reasons other than security, diagnostic, system backup or in compliance with law enforcement, or internal investigations authorized by the Associate Vice President of Human Resources and the General Counsel, University Systems and Networking staff may attempt to inform the user of this access.

The Family Education Rights and Privacy Act (FERPA) binds all users who have access to student data. Its application relevant to this Acceptable Use Policy centers on a student’s right to consent to disclosure of personally identifiable information. FERPA does permit certain information to be released without consent and this information is referred to as “Directory information”. To find out specifically what information you may or may not give out and to whom, you must contact the respective Dean of Students office.

POLICY VIOLATIONS

Policy violations should be reported immediately to any one of the individuals listed in Appendix 1.

Violations of this policy will be dealt with as described in the Student, Faculty and/or Employee Handbooks, any relevant contracts, and possibly State and/or Federal law or regulations. University students and employees who violate this Policy will be met with appropriate disciplinary action, up to and including dismissal, expulsion or termination from the University. Third parties who violate this Policy may have their relationship with the University terminated and their access to campus restricted. In addition, a user’s system privileges can be suspended for a specified time period or revoked and/or a monetary fine may be imposed on those in violation to reimburse the University for the staff time and other costs of investigating and rectifying the violation.

The University reserves the right to suspend computing resource privileges while investigating a complaint or troubleshooting a system or network problem.

This policy is subject to revision. Comments and suggestions are welcome and should be sent to Neal Sturm, Vice president & Chief Information Officer, mailstop M-DB2-01, or neal_sturm@fdu.edu.

This document will be reviewed semi-annually and is available both electronically and in printed form at each of the Campus Computing Centers.

It is the user’s responsibility to remain informed about the contents of this document.

Contacts

Neal Sturm
Vice president & Chief Information Officer
Mailstop M-DB2-01 973-443-8689 neal_sturm@fdu.edu

Saul Kleinman
Associate Vice President of Management Information Systems
Mailstop T-BH2-03 201-692-2065 saul@fdu.edu

Last Modified: icon icon Copy Link

Accessing an FDU Email Account on a Mobile Device Using the Outlook App

icon Close

The easiest way to access your FDU email account on your mobile device is to install the Outlook app from either the App Store (Apple) or the Play Store (Android).  We support and advise to use this method due to the program’s robustness and integration of all Office365 features.  Follow the steps bellow to install and set up the Outlook app on your phone.

  1. Use the links below to install the Outlook app onto your mobile device.
Android Play Store
Apple App Store
  1. Launch the app and press on “Add Account” if on an Android device. It will then prompt you to input your FDU email address. On iOS, the app will launch and immediately ask you for your FDU email address. Once filled out press “Continue” on Android. On iOS press “Add Account”
Android
Android
iOS
  1. You will be routed to the FDU Single Sign On Page, from here input your FDU email address and password and press “Sign In
  1. For security purposes, all applications which use FDU’s Single Sign On (NetID) require Duo two-factor authentication. After inputting your FDU NetID login information, Duo requires you to complete a method of second-factor authentication
  1. Your FDU email account has now been added to your device successfully. Ensure the email account is listed on your Outlook application.
Last Modified: icon icon Copy Link

What is the Law?

If you produce or distribute videos in the United States, your content may be subject to federal regulations regarding accessibility for the deaf and hard of hearing. The rules are adapting to the digital age.

Transcription and Closed Captioning

All video projects produced by Multimedia Services must be closed captioned and transcribed. Captions appear onscreen simultaneously with the audio and video and follows the same timing. It exists within the video player. A transcript is the same word-for-word content as captions, but presented in a separate document, whether it is a text file, word processing document, PDF, or web page.

Last Modified: icon icon Copy Link

Adding a FDU Email Account to a Mobile Device’s Native ‘Mail’ App

icon Close

Setting up your FDU Email Account in the Mail app on iOS

  1. Select the “Settings” app on your Apple iOS device
  1. Select “Passwords & Accounts
  1. Select “Add Account
  1. A list of email providers will be presented, select “Microsoft Exchange
  1. Enter your FDU email address and a description of the email account in the corresponding text boxes. Please note, the default description name for the account will be ‘Exchange’, if left unchanged. Tap or select “Next” to continue when finished
  1. When prompted select “Sign In
  1. Select “Work or School Account
  1. Enter your FDU email address and NetID password. Select “Sign In” to continue
  1. For security purposes, all applications which use FDU’s Single Sign On (NetID) require Duo two-factor authentication. After inputting your FDU NetID login information, Duo requires you to complete a method of second-factor authentication
  1. Chose the FDU NetID account information you would like to synchronize or access on your iOS device by toggling the choices on/off. Select “Save” to continue
  1. Your FDU email account has now been added to your iOS device successfully. Ensure the email account is listed under the “Passwords & Accounts” section of the ‘Settings’ iOS app

Setting up your FDU Email Account on Android OS

Due to multiple Android OS device manufacturers (Samsung, Google, or LG) each having their own native ‘Mail’ app, email setup and features are different depending on the manufacturer of the Android OS devices. For this reason, it is best practice to use the Microsoft ‘Outlook’ app found in the Google Play Store. Follow the instructions below to setup Outlook on Android OS.

Last Modified: icon icon Copy Link

Installing a Local Printer

Most new printers are plug and play compatible with Windows 10. When you receive your new printer, you can unbox it and remove any orange tape you see. After plugging in the power and turning the printer on, allow the printer to initialize (most new printers will have a display to show you it’s progress). When the printer finishes initializing, you can just connect the usb printer cable from the printer to your computer. Windows 10 should automatically install the printer for you.

Connecting to a Network Printer

Employees are able to add network printers to their own machines.

  1. Do a search for printers, and click on “Printers & Scanners”

  2. Click on “Add a printer or scanner”

  3. The list will start to populate and if you find your printer you can click on it and then click on “Add device”, otherwise scroll down to the bottom of the list and select “The printer I wanted wasn’t listed”

  4. In the new dialog box, select “Find a printer in the directory” and click “next”

  5. Search for your printer and double click on it when you find it.

  6. A box will let you know that the printer was successfully installed. Click “Next”

  7. You can click on “Print a Test Page” to verify you are connected to the right printer otherwise click on “Finish”

Last Modified: icon icon Copy Link

Approved Printer / Scanner List

Resources for: Faculty Staff
icon Close

Requesting a Printer and or Scanner

For a current list of approved printers and scanners, please reach out to the Purchasing Department. Please remember that most printers don’t have USB printer cables included upon purchase.

Note

While most modern printers support wireless connectivity, wireless printing capabilities may not be enabled on any printer without the explicit authorization of the Director of Networking.

Last Modified: icon icon Copy Link

Instant Meeting

Verizon Audio Conferencing service allows you to hold a meeting by phone at any time. To Setup an account click on the link below, complete the form, and choose submit. Voice Services will contact you with all the necessary details to begin using the service.

There is no charge to have an account, but charges are incurred when the account is used.

You will be assigned a permanent dial-in number and two passcodes – one for the leader and one for the participants.

To host an Audio Conference Call simply distribute the dial-in number, and the passcode for the participants with the date and time of the meeting.

Last Modified: icon icon Copy Link

Availability and Use of Google Apps

Resources for: Faculty Staff
icon Close

Effective Date: April 1st, 2021

I. Objective

Fairleigh Dickinson University (FDU) has adopted and standardized use of the Microsoft Office 365 Suite of products for University business. Some external entities, however, that conduct business with University employees utilize the Google Suite of products. This policy stipulates which Google applications will be made available to faculty and staff (not students) to enable collaboration with these external entities to conduct University business.

II. Purpose

Fairleigh Dickinson University (FDU) has adopted and standardized use of the Microsoft Office 365 Suite of products for University business. However, it is recognized that not all entities use Microsoft Office 365 as their platform and, from time to time, FDU faculty and staff may need the ability to collaborate with external entities that may be using the Google Suite of products. This policy stipulates which Google applications will be made available to faculty and staff to enable collaboration with these external entities.

  • Faculty and staff are reminded that in accordance with the University’s WISP policy, WISP protected data must not be stored or transmitted through any service, without the prior written authorization from the University Chief Information Security Officer.
  • As stated in the “Policy for Acceptable Use for Email”, Google Gmail is not available for use. All University business must be conducted through an FDU email account on Microsoft Office 365.
  • Faculty and staff may not use, or attempt to use, Google apps as a method of collaboration with students, faculty or staff. This FDU Policy on the Availability and use of Google Apps is expressly for the use with external entities only.
  • This Policy on the Availability and use of Google Apps applies only to use of Google applications by faculty and staff, and not FDU students.
  • Microsoft Office 365 is the only FDU supported platform for email and collaboration.
  • Google Apps are not supported by FDU IT personnel.

III. Scope

This policy applies to all FDU faculty and staff, wherever located throughout the world. Students will NOT have access to the fdu.edu Google Apps suite of products.

IV. Data Security Coordinator

The University has designated the Chief Information Security Officer, working together with the Data Security Information Response Team (DSIRT) and the USAN Director of Systems, to implement, supervise and maintain this Policy.

V. Internal Risks

To combat internal risks to the security, confidentiality, and integrity of any electronic, paper or other records, adherence to this Policy and the WISP will be strictly enforced.

VI. External Risks

To combat external internal risks to the security, confidentiality, and integrity of any electronic, paper or other records, adherence to this policy and the WISP will be strictly enforced.

VII. In Case of Questions

Questions regarding the availability of Google Apps can be directed to the University Technical Assistance Center (“UTAC”) at (973)-443-8822. The UTAC is available 24×7.

  • Please note that the UTAC is not able to provide application support on the Google suite of products.

VIII. Other Applicable Policies

IX. Exceptions

Requests for exceptions to this Policy should be directed in writing to the Chief Information Security Officer via The University Technical Assistance Center (“UTAC”) at 973-443-8822. Only the Chief Information Security Officer, in consultation with the DSIRT and the USAN Director of Systems, may grant such exceptions and will do so only after careful review and in writing.

X. Appendix

X1.1 Google Apps Available to Faculty and Staff

Note

These applications may only be used in collaboration with outside entities who use Google applications as their sole source of collaboration and request the use of any one of these application for official FDU business use. Any other use of these applications by FDU faculty and staff is a violation of this Policy.

Services Descriptions
AssignmentsAssignments brings together the capabilities of Google Docs, Drive and Search into a tool for collecting and grading student work.
CalendarGoogle Calendar is a web-based tool for personal scheduling and calendar sharing. It can be accessed through either a Web browser or through a third-party calendar client.
ClassroomGoogle Classroom enables teachers to create an online classroom area in which they can manage all the documents that their students need.
Drive and DocsGoogle Docs is an online word processor that lets you create and format text documents and collaborate with other people in real time. Google Drive on the web lets you store, access, and edit your files anywhere — on the web, on your hard drive, or on the go.
Google MeetGoogle Meet enables conversations with photos, emoji, group video calls for free. You can connect across computers, Android and Apple devices.
Google VaultVault is an information governance and eDiscovery tool for Google Workspace. With Vault, you can retain, hold, search, and export users’ Google Workspace data.
Groups for BusinessGoogle Groups for Business is an extended service available for G Suite users that allows you and other members in your organization to access the main Google Groups interface located at groups.google.com.
JamboardGoogle Jamboard is an online, collaborative whiteboarding application that lets you create, edit, and collaborate with other people in real time. Google Jamboard applications can be accessed on the Web, Android, and iOS.
KeepGoogle Keep is a note-taking service included as part of the free, web-based Google Docs Editors suite offered by Google
TasksGoogle Tasks is a simple to-do list—but with lists, subtasks, and mobile notifications, it has the basics you need to stay productive and keep track of the most important things you need to do.
Applied Digital SkillsApplied Digital Skills is a free, flexible video-based curriculum that prepares students for the growing number of jobs that require basic digital skills, such as email and spreadsheets.
Google Ad ManagerGoogle Ad Manager is an ad exchange platform introduced by Google on June 27, 2018. It combines the features of two former services from Google’s DoubleClick subsidiary, DoubleClick for Publishers and DoubleClick Ad Exchange.
Google AdsGoogle Ads is Google’s online advertising program. Through Google Ads, you can create online ads to reach people exactly when they’re interested in the products and services that you offer
Google AdSenseGoogle AdSense is an advertising program launched by Google in 2003 that allows website publishers to display targeted text, video, or image advertisements on website pages.
Google AlertsGoogle Alerts is a tool that allows you to track your chosen keywords and phrases so that you never miss another important conversation.
Google AnalyticsGoogle Analytics generates detailed statistics about a website’s traffic and traffic sources and measures conversions and sales
Google Cloud PlatformGoogle Cloud Platform is a suite of public cloud computing services offered by Google. The platform includes a range of hosted services for compute, storage and application development that run on Google hardware.
Google Cloud PrintGoogle Cloud Print is a web service offered by Google. Users associate printers with their Google Account.
Google Data StudioData Studio is Google’s reporting solution for power users who want to go beyond the data and dashboards of Google Analytics.
Google EarthGoogle Earth is the most photorealistic, digital version of our planet.
Google My MapsGoogle My Maps is your way to keep track of the places that matter to you.
Google PaymentsGoogle Pay (stylized as G Pay; formerly Pay with Google and Android Pay) is a digital wallet platform and online payment system developed by Google to power in-app and tap-to-pay purchases on mobile devices, enabling users to make payments with Android phones, tablets or watches.
Google PlayIn Google Play, the app description is split into two fields: Short Description, a limited 80 characters preview field and. the Full Description field, giving you space for an up to 4000 characters long app description.
Google Play ConsoleGoogle App Store
Google Search ConsoleThe Search Console lets you, as a webmaster, check on the status of the indexing Google does on your site, helping you to optimize your page visibility in Google search results. Get data, tools and diagnostics for a healthy, Google-friendly site.
Google TakeoutGoogle Takeout is a service that allows users of Google products, such as YouTube, Gmail, etc., to export their data to a downloadable ZIP file.
Managed Google PlayManaged Google Play Managed Google Play is a version of Google Play that’s optimized for enterprises.
Material GalleryMaterial Gallery is a collaborative tool for uploading design work, getting feedback, and tracking revisions – quickly and efficiently.
Partner DashPartner Dash is a service that hosts several applications used by Google’s partners to manage their relationships with us. Some of these applications are invite-only, while others are publicly available to anyone logged in with a Google Account.
Scholar ProfilesThe Google Scholar Profile search pane in Publish or Perish allows you to look up a Google Scholar profile and analyze the associated publication metrics.
Search And AssistantGoogle Assistant is Google’s artificial intelligence-powered voice assistant, which grew out of Google Now.

Last Modified: icon icon Copy Link

What is B-Roll?

B-Roll is supplemental footage inserted as a cutaway under narration or interview that helps tell the story. It can be used to introduce a segment or to cover a speaker’s audio or video miscues.

Acquiring B-Roll

Multimedia Services has a significant amount of b-roll, however, there are projects that are so specific that we will not have the exact material required. In these situations, the producer will need to schedule a day(s) to acquire the footage. In some cases, scenarios may need to be created. If students are involved in the scenario(s) a signed release form will be needed. If b-roll needs to be recorded off campus, permits may be required.

Last Modified: icon icon Copy Link

Best Practices for Securing Your Zoom Virtual Classroom

Resources for: Faculty
icon Close

Zoom comes pre-stocked with numerous security features designed to control online classrooms, prevent disruption, and help educators effectively teach remotely. Here are some best practices for securing your virtual classroom using Zoom.

Last Modified: icon icon Copy Link

FDU’s Acceptable Use Policy prohibits running software that accepts incoming connections from other computers. Programs such as BitTorrent or other P2P file sharing hosting program all contain server components that allow others to connect to your computer and retrieve files off of your system. In addition to the legal implications of sharing copyrighted materials, file sharing software creates a security concern. Improper use of these programs could result in the compromise of your private files and may leave your system open to attacks from other computers.

To view FDU’s stance on this issue in its entirety, please view the document below.

Last Modified: icon icon Copy Link

The Process

Once a project is completed, an invoice will be generated that accurately reflects the predetermined cost associated with the production. An e-mail will be sent to the initial contractor of the production, and a GL account number will be requested to be added to the invoice and sent to Finance to complete the transfer.

Last Modified: icon icon Copy Link

Required Process

Voice Services supports cellular services for faculty and staff for both FDU New Jersey Campuses.

In order to obtain a University provided cellular device, approval must be given by an Officer of the University along with the budget manager of your department. Any requests should be submitted through Voice Services with the approvals required by email.

All cellular service purchases must meet Fairleigh Dickinson University’s Cellular Policy.

Types of Cellular Devices/Services

Basic Cell Phones

Obtaining a basic cellular phone gives you the ability to make calls and text. There is a monthly charge for voice required with this device.

Smartphones

Obtaining a smartphone gives you the ability to make calls, text, email, and access the internet. There is a monthly charge for voice and data required with this device.

For a list of current devices available to FDU through Verizon Wireless please email voiceservices@fdu.edu.

Broadband

This service can be activated on a University provided iPad. This service is for domestic use only. There is a monthly charge for data required with this service.

Jetpack

This device is a 4G LTE mobile hotspot (mobile WIFI) and can be used with your laptop or iPad. Depending on the Jetpack model you are using it can be connected to multiple devices at one time. There is a monthly charge for voice and data required with this device

Mobile Hotspot

This service can be added to an existing FDU smartphone and is used as a WIFI hotspot on your smartphone. This is a domestic service only. There is a monthly charge required for this service.

International Services

Before you travel internationally, please email Voice Services. It is imperative that you request this change at least 3 business days prior to leaving the U.S. to ensure the changes are made and validated.

Last Modified: icon icon Copy Link

Two-factor Authentication

Two-factor authentication also referred to as multi-factor authentication, provides an additional layer of security when logging in to a website. Two-factor authentication is becoming the standard in cybersecurity. Google, Apple, and other services all have their two-factor authentication methods. In short, passwords are no longer sufficient in protecting our sensitive data; we’ve got to add another layer of security to our accounts.

Common FAQ’s for Duo Authentication

  • What are my authentication options?
    • DUO Push – if you have the DUO Mobile App installed on your smartphone or tablet, you can receive a push notification. From the app, you can approve or deny the login attempt.
    • Passcodes via DUO Mobile App – If you have the DUO Mobile app installed, you can receive a single passcode by tapping the FDU logo in the mobile app. This code must be used immediately.
    • Passcodes via SMS (Faculty/Staff Only) – users can receive a one-time use code via text message. To get you a one-time code, click Enter Passcode, then click on the blue button “Text me new codes.”  These codes do not expire, and they are valid until used.    You do not have to have a smartphone for this option.
    • Phone Call
    • (Faculty/Staff Only) – you can receive a phone call on your mobile phone or landline phone. The call will give instructions on approving or denying the login attempt.
  • Is DUO Mandatory?

    DUO is required for all FDU Staff, Faculty, and Students.

  • What are Passcodes?

    If you opt-out of the DUO Mobile Application push notifications, there are a variety of passcode options to utilize as your second verification method.

    • Passcodes via DUO Mobile App – If you have the DUO Mobile app installed, you can receive a single passcode by tapping the FDU logo in the mobile app. This code must be used immediately.
    • Passcodes via SMS (Faculty/Staff Only) – users can receive a one-time use code via text message. To get you one-time code click Enter Passcode, then click on the blue button “Text me new codes.”These codes do not expire, and they are valid until used. You do not have to have a smartphone for this option.
    • Temporary Passcodes – If you do not have your device with you, you can obtain temporary passcodes by calling the University Technical Assistance Center (UTAC) at (973)-443-8822. Each of the passcodes can only be used once, and will expire in 7 days.
  • What does “Remember This Device for 60 Days” mean?

    Selecting this option will allow you to bypass DUO authentication for the next 60 days. This only works if cookies are enabled, and you are logging in from the same computer and browser. You will still be prompted to verify once – with your username and password. You will not be able to access your settings on that particular browser during the 60 days. Please note that if you have tools or policies running that regularly delete or clean cookies, the remember me feature will not work. If you do need to access your settings (perhaps to add another device), just try another browser or visit the FDU Self-Service Portal. Remember me will not work if your browser is set to private browsing mode.

  • How does “Remember This Device for 60 Days” work?

    The remember me feature relies on browser cookies. For remember me to work, your Internet browser must allow cookies to be stored. Visit your browser content settings to ensure cookies are being stored. Some departments on campus do not allow cookies to be stored. If the remember me feature does not work on your browser, check with desktop support in your area.

  • Forgot your device?

    If you do not have your device with you, you can obtain a batch of temporary passcodes. To obtain a temporary passcode, call the University Technical Assistance Center (UTAC) at (973)-443-8822.  Each of the passcodes can only be used once and will expire in 7 days.

    NOTE: If you have lost your device, please report it to the University Technical Assistance Center (UTAC) at (973)-443-8822.  We want to ensure someone else does not maliciously authenticate your account with your device.

  • Who can use DUO?

    DUO is available to all faculty,staff, and Students. At this time, DUO is not available to FDU retirees, past employees, or alumni.

  • Can I use DUO without using Wi-Fi or Cellular data?

    Yes, the passcode option on the DUO app does not require WiFi or cellular connectivity, it even works on airplane mode. To use this option, visit the DUO app on your smartphone, and tap the key icon to obtain a passcode. Enter the passcode into the DUO prompt when logging into any website that requires DUO authentication.

  • What Applications are Using DUO?

    DUO Authentication is required by any application the utilizes the university Single Sign-On (SSO) service.  Examples of some websites that require DUO authentication are listed below.

    • WebAdvisior
    • WebCampus
    • Office365 (Office365.fdu.edu)
    • Blackboard
    • Zoom
  • I have stopped receiving push notifications on DUO Mobile.

    You may have trouble receiving push requests if there are network issues between your phone and Duo’s service. Many phones have difficulty determining whether to use the Wi-Fi or cellular data channel when checking for push requests and simply turning the phone to airplane mode and back to normal operating mode again often resolves these types of issues, if there is a reliable internet connection available. Similarly, the issue may be resolved by turning off the Wi-Fi connection on your device and using the cellular data connection.

    Check the time and date on your phone and make sure they are correct. If the date and time on your phone are manually set, try changing your device’s configuration to sync date and time automatically with the network.

    iOS users can run a troubleshooting tool from within Duo Mobile version 3.32.0 or later. To run the tool:

    1. Open the Duo Mobile app on your iOS device and tap the Edit button in the top left of the accounts list screen, then tap the name of the account for you aren’t receiving push requests.
    2. Next, tap the Get Started button in the “Missing Notifications?” section of the “Account Details” screen.
    3. Duo Mobile performs the test. If any step fails, you’ll receive further troubleshooting suggestions. After taking the suggested actions, press “Run test again” to retry.

    The steps that Push Troubleshooting performs automatically are as follows:

    • Check device settings.
    • Check internet connectivity.
    • Check that the device can contact Duo’s cloud service.
    • Attempts to send a test Duo Push notification.

    Should none of these actions help, see the Duo Knowledge Base for additional iOS and Android troubleshooting steps.

    If you can’t get Duo Push working on your own, you can log in with a passcode generated by the Duo Mobile app and send a new activation link to your phone.

    If you’ve tried the suggestions here but can’t get Duo Push working or reactivate your device yourself, please contact the University Technical Assistance Center (UTAC) at (973)-443-8822.

  • What if I get a notification that someone is trying to access my account, but I didn’t request it?

    Press the red “X to deny access to your account, then promptly change your FDU NetID password.

  • Is the DUO smartphone app available for iOS (iPhone / iPad) and Android devices?

    Yes! Visit the app store on your smartphone to download DUO Mobile.

    DUO for iOS >

    DUO for Android >

    NOTE: Google Play Services are required to receive push notifications on Android. Users without Google Play Services installed will have to “fetch” by swiping down in the DUO Mobile app.

  • What if I get a new smartphone or device?
    1. If your phone number has not changed, login to FDU Self-Service Portal then choose the “Call my Phone” option.
    2. Choose your device from the list, and then click “Device Options” next to your phone.
    3. Next click the “Reactivate Duo Mobile” button (you will need to install the Duo app on your phone to proceed). Then follow the instructions to activate DUO Mobile on your new device.

    If you have a new phone number, you will first need to obtain a temporary passcode (see the ‘What are Passcodes?’ section above).

    1. Login to FDU Self-Service Portal and enter the temporary passcode.
    2. Click on “Add a new device.”
    3. Once you complete adding your new device, please delete the device you are replacing.
  • Can I have DUO on more than once device?

    Yes, you can add devices by visiting your DUO settings. When you see the DUO prompt with the three notification options, click “Settings” at the top right.

    NOTE: If you are using the Remember Me for 60 days feature, you will need to visit FDU Self-Service Portal access your settings.)

    After you click Settings, click “Add a New Device“. You can register smartphones, cell phones, tablets, and landline phones.

  • What can the DUO app access on my smartphone?

    The DUO smartphone application serves only to provide two-factor authentication. It does not access any personal information on your device, nor does it track your location. Learn more about DUO’s commitment to privacy on its website.

Still have Questions about DUO?

Contact our University Technical Assistance Center (UTAC) at (973)-443-8822 with any additional questions.

Last Modified: icon icon Copy Link

Cisco Unified Communications Call Forward

Resources for: Faculty Staff
icon Close

With Cisco Unified Communications call forwarding, you have the ability to forward all of your incoming calls to another phone number. This can be useful in the event that you need to work from home or temporarily work from a different office.

Enabling Call Forwarding On-site

  1. To activate call forwarding, press “Forward All” while the phone is still on the hook
  2. To forward off campus, enter 3 then 1 and the 10-digit number.
    Example: (3 1 201 555 1212)
  3. To forward on campus, enter the 4-digit campus extension
    Example: (5555)
  4. A message will briefly appear on your phone’s screen to let you know that calls are now being forwarded
  5. With forwarding enabled, the onscreen “Forward All” button will now read as “Forward Off

NOTE: To Disable Call Forwarding simply press this “Forward Off” button when you are ready to deactivate the feature.

The call forwarding process is also explained in your phone’s Quick Reference Guide.

This short and easy to use document explains many essential UC features including conference calls, call transferring and voicemail.

As always, please contact our University Technical Assistance Center at (973)-443-8822 if you have any questions.

Enabling Call Forwarding Offsite

If you are unable to be by your FDU phone, and you need to set up Call Forwarding, you can do this through our Self-Service portal.

  1. You must have an NWN Cloud Self-Service account in order to modify your preferences. If you have one already, proceed to step 3 otherwise continue to step 2
  2. Call UTAC at (973)-443-8822 and let them know you are accessing your NWN Cloud Self-Service portal for the first time. UTAC will provide you a temporary password for logging in the first time
  3. Visit the self-service portal at fdu-selfcare.nwncloud.com
  4. Enter your full NETID@fdu.edu in the login field. Example: (SmithR@fdu.edu)
  5. Enter your NWN Cloud account password and click “Enter
  6. Next click on your Name on the top right of the screen. Hover over the drop-down menu and click “My Account
  1. Under “Web Password” un-click the checkbox to set a custom password. When done, click “Apply” in the top right corner
  1. Once logged in, click “My Call Forwards
  1. Input the phone number you wish to forward to then click “Apply
    • To forward off campus, enter 3 then 1 and the 10-digit number.
      Example: (3 1 201 555 1212)
    • To forward on campus, enter the 4-digit campus extension
      Example: (5555)

NOTE: If you have more than one internal number, click on the extension you wish to forward.

NOTE: If you need to use your personal cell phone to make a call from a remote site, and you do not wish to reveal your Caller ID, simply prepend the phone number to be dialed with *67. Example: *672015551212. Your phone number will not appear to the phone of the person dialed.

If, at any time, this function does not work, or you can not access the nwncloud portal, please call UTAC at (973)-443-8822 or open a ticket for Voice Services.

Last Modified: icon icon Copy Link

Cisco Unified Communications Headset Selection and Pricing

Resources for: Faculty Staff
icon Close

As a staff or faculty member, you can request a Headset for the new Cisco IP Unified Communications system.

Below you will find PDF’s containing headset offerings and the pricing sheet.

Note: With the selection of a headset, please note which Cisco phone model your headset will being connecting to.

The prices on this sheet have been pre-negotiated with our vendor. A quote is not needed to place an order for one of the approved headsets. Only approved headsets can be attached to Unified Communications devices.

Any questions, please contact Megan Kogut at (203)-851-7083

Last Modified: icon icon Copy Link

Cisco Unified Communications Jabber Softphone Installation

Resources for: Faculty Staff
icon Close

Installing Cisco Jabber Softphone

When you are out of the office, a softphone on your computer can be used to make and receive calls from your campus phone number.

  1. You must have an active NWN Cloud Self-Service account in order to use the Cisco Jabber Softphone. If you have one already, proceed to step 3 otherwise continue to step 2
  2. Call UTAC at (973)-443-8822 and let them know you are accessing your NWN Cloud Self-Service portal for the first time. UTAC will provide you a temporary password for logging in the first time
  3. Visit the self-service portal at fdu-selfcare.nwncloud.com
  4. Enter your full NETID@fdu.edu in the login field. Example: (SmithR@fdu.edu)
  5. Enter your NWN Cloud account password and click “Enter
  6. Click and download Jabber for Windows or macOS, located within the links sections.
  1. Each Jabber link will send you to a webpage to download the latest Cisco Jabber software. Choose download at the top right and wait for it to start

NOTE: There is no need to login again if you are prompted, the download will begin shortly.

  1. Install the Jabber Software

Windows

  • For Windows, double click the downloaded CiscoJabber.ZIP file and double click on the Setup file to start the installation. Click “Yes” to accept and install the software. Once complete, the Cisco Jabber Software will start and it will have created a shortcut in your Programs Folder



NOTE: If you are prompted for an administrative account, and the installation will not proceed, call UTAC and they will be able to assist you through this step.

macOS

  • For Mac, double click the downloaded CiscoJabber.PKG and proceed through the installation.

The Cisco Jabber Software will be available under your Applications folder.

  1. Start Cisco Jabber and enter your username, which is your full NETID@fdu.edu in the login field and click continue. Example: (SmithR@fdu.edu)
  1. Enter your NWN self-service portal password and click Sign In
  1. The Cisco Jabber client installation is now complete.
Last Modified: icon icon Copy Link

Cisco Unified Communications Phone System Manuals

Resources for: Faculty Staff
icon Close

Below you can download the manuals for the new FDU Unified Communications Phone Systems from Cisco. The manuals provide information on how to use and access the voicemail features.

Florham and Metro

Vancouver

Last Modified: icon icon Copy Link

Cisco Unified Communications Voice Mail Features

Resources for: Faculty Staff
icon Close

Initial Voice Mail Set-Up from Your Own Campus Extension

From your desk phone:

  1. Press the message button  on your phone instrument.
  2. Enter your Mailbox ID, this is your 4 digit extension.
  3. Enter the temporary PIN 13579 followed by the # sign.
  4. Listen to the prompts to set-up your voicemail greeting. 

Initial Voice Mail Set-Up from Off Campus

When off campus, you can setup your voicemail system by dialing your campus’ assigned voicemail number:

  • Florham Campus: (973)-443-8100
  • Metropolitan Campus: (201)-692-7600
  • Vancouver Campus: (604)-648-4485

Follow these instructions to log into and setup your voicemail:

  1. Press 1 to access the voicemail system.
  2. When prompted enter your ID, this is your 4 digit extension.
  3. Enter the temporary PIN 13579 followed by the # sign.
  4. Listen to the prompts to set-up your voicemail greeting. 

Accessing Voicemail On Campus

  • Press the message button on your phone instrument.
  • Enter your Mailbox ID, this is your 4 digit extension.
  • Enter your 5 digit PIN followed by the # sign.

Accessing Voicemail Off Campus

You can access your voicemail when off campus by dialing your campus’ assigned voicemail phone number:

  • Florham Campus: (973)-443-8100
  • Metropolitan Campus: (201)-692-7600
  • Vancouver Campus: (604)-648-4485

Follow these instructions to log into your voicemail:

  1. Press 1 to access the voicemail system.
  2. When prompted enter your ID, this is your 4 digit extension.
  3. Enter your 5 digit PIN followed by the # sign.

Accessing Voicemail from Another Extension That Has Voicemail

Dial the voicemail extension 8100, 7600 or 4485.

  1. Press 1 to access the voicemail system.
  2. When prompted enter your ID, this is your 4 digit extension.
  3. Enter your 5 digit PIN followed by the # sign.

Changing Voicemail Messages & Passcodes

When you first set up your mailbox, you record a greeting, your name and select a passcode. The set-up options allows you to change these at any time. You should update your greeting(s) regularly to let callers know whether you’re in or out of the office. Your voicemail message should always be appropriate, so callers will feel confident in leaving messages. And, of course, boxes should be emptied daily, if not more frequently.

When the University or your department closes you should always redo your voicemail message making the caller aware that the University or your department is closed.

The voicemail system will prompt you as to how to make changes. When you are in doubt about what to do next, you can download the manuals for the new FDU Unified Communications Phone Systems from Cisco. The manuals provide information on how to use and access the voicemail features.

If you are NOT forwarding your office phone, you should create a new voice message similar to the messages below and establish a pattern and practice of checking your voicemail regularly. 

Please update your outgoing message to reflect an appropriate out of office message.

Voicemail Forwarding Suggested Message

Below is a recommended Voicemail Message:

“You’ve reached the voicemail of [NAME, TITLE/DEPT]. Fairleigh Dickinson University has moved to virtual business operations as a precaution against the spread of COVID-19. I’ll be checking my voicemail, but would appreciate you also reaching out to me by email at [YOUR EMAIL]@fdu.edu. Thank you.”

Last Modified: icon icon Copy Link

Welcome to Fairleigh Dickinson University. As a new member of our campus community, one of your first priorities will be gaining access to FDU NetID. With an FDU NetID, you will have access to a variety of IT resources, including Office365. Depending on your role within the University, you will either be creating an account or claiming an account that has already been created for you. Please follow the process below which applies to you.

New Student through Welcome Email (US Students)

If you are a new student of our New Jersey campuses and you have received a Welcome email from fdu-it@fdu.edu, please visit the link below


New Student With or Without an Activation Code

If you are a new student at FDU Vancouver or if you are a New Jersey based student that has not received a Welcome Email, please visit the link below


New Faculty or Staff Member

If you are a new Faculty, adjunct Faculty, or Staff member, please visit the link below


All Others

If you are entitled to an FDU NetID account but you do not fall under any of the categories above, please visit the link below

Last Modified: icon icon Copy Link

FDU has a number of technology enhanced classrooms that are capable of video/computer projection. To find out if your classroom is on this list please review the charts below for your campus:

Metropolitan Campus Technology Chart

Tip

Scroll left to right on the chart if viewing on a Mobile device or in Desktop preview mode. To view the full chart, rotate your Mobile device into landscape mode. On Desktop, press the full screen button (icon with expanding arrows inside of a circle) on the top right of the article header.

Building NameProjector Enabled RoomsDVD/VCR Combo RoomsSpeaker EnabledEcho 360HDMI JackSmartboard
Becton Hall202YesYes Laser
Becton Hall205Yes Yes Laser
Becton Hall208YesYes Laser
Becton Hall302Only DVD Yes YesYes
Becton Hall304Only DVD Yes YesYes
Becton Hall305 Yes Yes
Becton Hall306 Yes Yes
Becton Hall402 Yes Laser
Becton Hall403/404 (LED Screen)Yes Yes YesYes
Becton Hall405 Yes Laser
Becton Hall406 Yes Laser
Becton Hall407 Yes Laser
Becton Hall408 Yes Laser
Becton Hall Conference Room307
Dickinson Hall1104YesYes Laser
Dickinson Hall1128YesYes Yes
Dickinson Hall1129YesYes Yes
Dickinson Hall1142YesYes Laser
Dickinson Hall1143Yes Yes Yes
Dickinson Hall1144Yes Yes Laser
Dickinson Hall1148 Yes
Dickinson Hall1149YesYes Yes
Dickinson Hall1150YesYes Yes
Dickinson Hall1151YesYes Laser
Dickinson Hall1152 (LED Television)YesYes Yes
Dickinson Hall1153 (LED Televison)YesYes Yes
Dickinson Hall1165 (LED Televison)YesYes Yes
Dickinson Hall1170 (LED Television)YesYes Yes
Dickinson Hall2135YesYesYesLaser
Dickinson Hall2137Yes Yes Yes
Dickinson Hall2177YesYes Yes
Dickinson Hall2178YesYesYesLaserYes
Dickinson Hall2230Yes Yes Laser
Dickinson Hall2249 Yes YesYes
Dickinson Hall2262Individual DVD & VCR Yes
Dickinson Hall2263 Yes Laser
Dickinson Hall4468Yes Laser
Dickinson Hall4469YesYes Laser
Dickinson Hall4473YesYes Laser
Dickinson Hall4475Yes Yes Laser
Dickinson Hall5504YesYes Laser
Dickinson Hall5506YesYes Laser
Dickinson Hall5509 Laser
Dickinson Hall5520 Yes Yes
Dickinson Hall5523 Yes Yes
Dickinson Hall5529YesYes Laser
Dickinson Hall5534YesYes Laser
Dickinson Hall – Conference Room1191 Laser
Dickinson Hall – Conference Room2245 YesYesLaser
Dickinson Hall – Continuing Education1127YesYes Laser
Dickinson Hall (Lab A)2163 Yes Yes
Dickinson Hall (Lab B)2164 Yes Yes
Edward Williams Building201 Yes Yes
Edward Williams Building202 Yes Yes
Edward Williams Building203 Yes
Edward Williams Building204 YesYes Yes
Edward Williams Building205 Yes Laser
Edward Williams Building206 Yes Laser
Edward Williams Building207 Yes Yes
Edward Williams Building209 Yes Laser
Edward Williams Building301 Yes Laser
Edward Williams Building302 Yes Laser
Edward Williams Building303 Yes Laser
Edward Williams Building304 Yes Laser
Edward Williams Building305 Yes Laser
Edward Williams Building308 Yes Laser
Edward Williams Building309 Yes Laser
Edward Williams BuildingCommons 1YesYes Laser
Edward Williams BuildingCommons 2YesYes Laser
Edward Williams BuildingAuditoriumYesYes Laser
Giovatto LibraryWriting Lab Yes Laser
Giovatto LibraryWLB 3YesYes Laser
Giovatto LibraryWLB 4YesYes Laser
Giovatto LibraryAuditoriumYesYes
Giovatto LibraryWLB 1 (LED Screen)YesYes (TV Speakers)
Giovatto LibraryWLB2 (LED Screen)YesYes (TV Speakers)
Multipurpose RoomYesYesYes Laser
Muscarelle105Yes Yes Laser
Muscarelle202YesYes
Muscarelle203Yes Yes Laser
Muscarelle204 Yes Laser
Muscarelle205YesYes Yes
Muscarelle206Yes Yes Yes
Muscarelle207L Yes Laser
Muscarelle207RYesYes Yes
Robison Annex100Yes Yes Yes
Robison Annex101YesYes Yes
Robison Annex203Yes Yes Yes
Robison Annex204YesYes Yes
Robison Annex205Yes Yes Laser
Robison Annex300 Yes Laser
Robison Annex301 Yes Yes
Robison Annex303 Yes Laser
Robison Annex304YesYes Laser
Robison Annex305 Yes Laser
Robison Hall23BYesYes Laser
Robison Hall501
Robison Hall503
Rutherford RoomYesYesYes Laser
Universit Hall TheatreLED ScreenYes
University Hall12 Yes
University Hall22 Yes
University HallMultimedia Lab YesYes
Williams Hall Yes
Williams Hall102YesYes Laser
Williams Hall107YesYes Laser
Williams Hall201 Yes Laser
Williams Hall202 Yes Laser
Williams Hall203 Yes Laser
Williams Hall206 Yes Laser
Williams Hall207 Yes Yes
Wilson AuditoriumYesYesYes Laser

Florham Campus Technology Chart

Tip

Scroll left to right on the chart if viewing on a Mobile device or in Desktop preview mode. To view the full chart, rotate your Mobile device into landscape mode. On Desktop, press the full screen button (icon with expanding arrows inside of a circle) on the top right of the article header.

Building NameProjector Enabled RoomsDVD/VCR Combo RoomsSpeaker EnabledEcho 360HDMI JackSmartboard
Dreyfuss Building102YesYes Laser
Dreyfuss Building103YesYes Laser
Dreyfuss Building104YesYes Laser
Dreyfuss Building105YesYes Laser
Dreyfuss Building106YesYes Laser
Dreyfuss Building107YesYes Laser
Dreyfuss Building121Yes Laser
Dreyfuss Building125YesYes Laser
Dreyfuss Building206 Yes Yes
Dreyfuss Building207 Yes Yes
Dreyfuss Building208 Yes Yes
Dreyfuss Building210 Yes Yes
Dreyfuss Building211
Dreyfuss Building212
Dreyfuss Building213
Dreyfuss BuildingTheater
Hennessey Room 1Yes Yes Yes
Hennessey Room 2Yes Yes Yes
LibraryLibrary ClassroomYes Yes Laser
Mansion11YesYes Laser
Mansion12Yes Yes Laser
Mansion13YesYes Laser
Mansion17Yes Yes Laser
Mansion30Yes Yes Laser
Mansion33Yes Yes Yes
Mansion35Yes Yes Laser
Mansion36YesYes Yes
Mansion38YesYes Laser
Moninger 105 Just DVDYesYesYesYes
Moninger 106 Just DVDYesYesYesYes
Moninger 107YesJust DVDYes Laser
Moninger 113Yes Yes Yes
Moninger 118 Just DVDYesYesLCD ScreenYes
Moninger 119 Just DVDYesYesLCD ScreenYes
Moninger 205 Yes
Moninger 206 Yes
Moninger 210 Yes
OrangerieYes Yes Yes
Science Building1 Yes Yes
Science Building3 Yes
Science Building6 Yes
Science Building7Yes Yes Yes
Science Building9 Yes Yes
Science Building11Yes Yes Laser
Science Building15A Yes Yes
Science Building17YesYes Yes
Science Building18 Yes Yes
Science Building19 Yes Laser
Student CenterSammartino RoomYes Yes Yes
Student CenterFlorham RoomYes Yes Yes
Student CenterWroxton RoomYesYes
Student CenterBottle Hill Room
Twombly LoungeYesYesYes Laser
Zen Building102YesYes Yes
Zen Building103YesYes Yes
Zen Building104YesYes LCD Panel
Zen Building105YesYes
Zen Building106YesYes
Zen Building107YesYes Yes
Zen Building108YesYes Yes
Zen Building109YesYes Yes
Zen Building110DVD onlyYes LCD PanelYes
Zen Building202YesYes Yes
Zen Building203YesYes Yes
Zen Building204Yes Yes Yes
Zen Building205YesYes Yes
Zen Building206YesYes LCD Panel
Zen Building207Yes Yes Yes
Zen Building208DVD onlyYes LCD PanelYes
Zen Building209YesYes Yes
Zen Building210 Laser
Zen Building211 YesYes Yes
Zen Building212 YesYes Yes

If you need assistance, please reach out to the help desk by calling (973)-443-8822 or via E-mail at fdutac@fdu.edu.

Last Modified: icon icon Copy Link

Backup Alert Email Notifications

Code42 will send users an email alert notifying of any incomplete backups of their devices.

  • The Code42 email alert will be sent from Code42 for Enterprise <noreply@code42.com>
  • The Subject line of the email will be labeled with: Critical: [Name of Device] not backed up

Backup Alert

You will receive an alert when your computer hasn’t backed up to Code42 for 5 calendar days. The email will look like the example below:

Code42 Backup Alert Email Notification

What to do if you get a backup alert

After receiving a Code42 backup alert email, you should locate the device the email specifies in need of backup. The Code42 device name will be listed in the Subject: line and Computer Name: line of the Code42 backup alert email. To locate the name of a Code42 device, left-click the Code42 “C” symbol icon in the Windows System Tray, also referred to as the notification area.

Tip

The Windows System Tray or notification area is usually located on the bottom right of the Windows taskbar, next to the displayed digital clock.

For macOS users left-click Code42 “C” symbol icon on the macOS icon menu bar. The Code42 device name will be displayed in the console. Ensure the Code42 application displays the same name as the Code42 backup alert email you received.

This image has an empty alt attribute; its file name is Code-42-Tray-Icon.svg

Code42 “C” symbol icon

Code42 Device Name

After locating the correct specified device stated in the Code42 backup alert email, force a backup of the device by performing the following:

  1. Left-click the “Code42” System Tray or macOS menu bar Icon
This image has an empty alt attribute; its file name is Code-42-Tray-Icon.svg

Code42 Icon

  1. Left-click “Run backup now

Note

The backup may take some time to complete. This depends on the length of time since Code42’s last complete backup and the amount of new data needed to be backed up.

Last Modified: icon icon Copy Link

Code42 is a backup agent that will back up all data on a university device under the primary owner’s profile. The backup sets can be used for restoring data to a machine, whether it has been reformatted, replaced, or compromised. This document will outline the steps needed to install, activate, and restore data to a new or existing device.

index

Index

About Code 42

Code42 Policy

Code42 is required on all University provided desktops and laptops to backup all University Business data to prevent data loss.

Who Can use Code42?

Code42 is presently licensed for full-time faculty and full-time staff only. The University mandates Code42 for proper data security practices. If a user has personal data that they wish to exclude from being backed up, a folder labeled “Personal Documents” can be found and utilized in your “Documents” folder. This folder and its contents will be ignored by Code42 when your system is being backed up.

Personal Documents folder locations:

Windows PCC:\users\username\Documents\Personal Documents\
macOS/users/username/documents/Personal Documents/

Tip

If the Personal Documents folder does not exist in your Documents folder, you can manually create it and the folder will be automatically ignored by Code42.

Is My Data Secure?

Code42 uses AES-256 encryption is used when storing your backups and can only be accessed by the Code42 account owner and administrators.

What is Backed Up?

All data found in a user profile will be backed up by Code42.

Location of User Profile:

Windows PCC:\users\UserName\
macOS/users/username/

Warning Warning

Any data not stored in the user profile will NOT be backed up by Code42. It is highly encouraged to store university business data within your user profile.

How to Install on a Windows PC

To install Code42 on your Windows PC, please follow the instructions below.

Note

Code42 is being automatically deployed to all systems owned by Faileigh Dickinson University.

Before Installing Code42, you must be logged in as the owner of the machine using your NetID Credentials.

  1. Open FDU Self Service Portal for Software on your University PC
  2. Click on Code42 Backup and then click “Install” on the right-hand side

Note

It could take several minutes for the client to make the first connection and start the first backup.

The entire process will take approximately 5-7 minutes, depending on your internet speed. Once Code42 is installed, your account is automatically provisioned in the Code42 system, and your backup will begin shortly.

How to Install on macOS

To install Code42 on your macOS device, please follow the instructions below.

Note

Code42 is being automatically deployed to all systems owned by Faileigh Dickinson University.

  1. Locate the FDU Self Service Portal in your applications folder or locating the icon on your dock
  2. Locate Code42 Backup and click “Enroll”
  1. After the package installs, you will be prompted to enter your FDU email address and then click “OK

Note

It could take several minutes for the client to make the first connection and start the first backup.

The entire process will take approximately 5-7 minutes, depending on your internet speed. Once Code42 is installed, your account is automatically provisioned in the Code42 system, and your backup will begin shortly.

How to Replace or Add a Second Device

This process is used when someone will be assigned a second device and wishes to have it backed up or if the Code42 needs to be re-installed on the same device. Because an account already exists, it cannot be provisioned automatically. It must be manually setup either to replace an existing device or create a new backup set on the second computer.

Note

In order to proceed, code42 must be installed prior to continuing, please refer back to the Install instructions for your operating system from the Code42 User Guide. A link is found at the bottom of this page.

Tip

A backup set is Code42’s way of describing the backup configuration and what files are being backed up.

  1. Click on the Code42 app in the system tray (PC) or Menu bar (macOS) and then click “Setup Device
  1. If prompted, log in to the FDU NetID Portal and proceed through the FDU single sign-on process
  2. Click “Replace Existing
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-2.png
  1. Click “Start” to continue with the replace existing device process
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-3.png
  1. Select the device from the list you are replacing and click “Continue
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-4.png
  1. Click “Select Files” on the following window
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-5.png
  1. Select and Choose which files you wish to replace by placing a checkmark next to each. When finished, click “Restore Files
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-6.png
  1. The next window will allow you to select how you wish to restore your files. Make your selections and click “Go
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-7.png
  1. The next window will display download progress for the restore process. You can continue forward by clicking “Continue” at the bottom
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-8.png
  1. The next window Downloads the Files to your device. When the transfer is completed, click “Next
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-9.png

Tip

You can close this window and continue working or you can click transfer more files and repeat the steps for additional files. This will extend the time it needs to restore.

  1. Your Transfer is now complete, click “Finish
This image has an empty alt attribute; its file name is Code42-How-to-Add-a-Second-Device-or-Replace-an-Exisiting-Device-Figure-10.png

Verifying a Backup Instructions

If you are unsure if you have Code42 installed and backing up your system, this quick guide will help give you some comfort.

  1. Click on the Code42 icon from the system tray on Windows and the menu bar on macOS
This image has an empty alt attribute; its file name is Code-42-Tray-Icon.svg

Code42 Icon

  1. The Progress will be displayed like in the Figure below
This image has an empty alt attribute; its file name is Code42-Verifying-Backup-Progress-Figure-2.png

Note

Depending on your backup size, this could take anywhere from a few minutes to a few days. Code42 will continue to run and backup in the background. After the first successful backup, incremental backups will occur.

How to Manage Backups

Code42 allows you to manage your backup sets. If you would like to review your backup set, please click the support link at the top of the page to open a UTAC ticket for a Computing Services team member to work with you.

How to Restore Files

Accidentally deleted or unable to find a file? Code42 can help. Please follow the following guidelines in restoring lost or previous versions of files.

  1. Click the Code42 System Tray or macOS menu bar Icon
This image has an empty alt attribute; its file name is Code-42-Tray-Icon.svg

Code42 Icon

  1. Left-click on the gear symbol and left-click on “Open Code42….
  1. If prompted, log in to the FDU Single sign-on Portal and proceed through the FDU DUO Multifactor authentication procedures
  2. Click “Restore Files
  3. Select the device you wish to restore from
This image has an empty alt attribute; its file name is Code42-How-to-Restore-Files-Figure-2.png

Note

If you have more than one backup device, please select the device from where you want to restore the file from.

  1. You can select a date range from when you wish to restore from on the right-hand side
  2. Navigate to the folder(s) and/or file(s) you wish to restore and place a check next to each one
  3. Click “Restore Files
This image has an empty alt attribute; its file name is Code42-How-to-Restore-Files-Figure-3.png
  1. Select how Code42 will restore your files. Click “Go” when finished
This image has an empty alt attribute; its file name is Code42-How-to-Restore-Files-Figure-4.png

Note

Above are the recommended options for restoring files, this will help you find them more easily.

The time it takes to restore your files will depend on how much data is being restored, available system resources, and available bandwidth.

How to Add Backup Sets

Using Code42 you can create backup sets that will back up your data to additional devices utilizing a schedule. This is useful to have immediate access to critical files in the event of data loss.

This guide is only needed if you wish to have a local backup of your data.

Note

If you schedule multiple backup sets to run at specific times and the backup sets go to the same destination, ensure that these times do not overlap. This ensures good backup performance.

  1. Click the Code42 System Tray or macOS menu bar Icon
This image has an empty alt attribute; its file name is Code-42-Tray-Icon.svg

Code42 Icon

  1. Left-click on the gear symbol and left-click on “Open Code42….
This image has an empty alt attribute; its file name is Code-42-How-to-Add-Backup-Sets-Figure-1.png
  1. If prompted, log in to the FDU Single Sign-on Portal and proceed through the FDU DUO Multi-factor authentication procedures
  2. From the Code42 console window, click the “Dropdown Arrow” symbol next to your device name to drop down a menu, then click “Add Backup Set…
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-2.png
  • The next window will be the Add Backup Set configuration window.
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-3.png

Note

The “Add Set” button will be un-clickable until it is completely configured.

  1. Click “Rename” to label your backup set
  2. Changing Selected Files, click “Change”, and select the files and folders you wish to backup to a local destination
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-4.png
  1. When finished click “Save
  2. Click “Change” to set your destination for your backup
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-5.png
  1. Select your destination by clicking “Add Local Destination (usually an external hard drive) and click “Save
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-6.png
  1. Click “Add Set” to finalize the setup and start backing up to a local location
This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-7.png

Your new back upset is finished and will begin backing up as configured.

This image has an empty alt attribute; its file name is Code42-How-to-Add-Backup-Sets-Figure-8.png

Backup Alert Email Notifications

Code42 will send users an email alert notifying of any incomplete backups of their devices.

  • The Code42 email alert will be sent from Code42 for Enterprise <noreply@code42.com>
  • The Subject line of the email will be labeled with: Critical: [Name of Device] not backed up

Backup Alert

You will receive an alert when your computer hasn’t backed up to Code42 for 5 calendar days. The email will look like the example below:

Code42 Backup Alert Email Notification

What to do if you get a backup alert

After receiving a Code42 backup alert email, you should locate the device the email specifies in need of backup. The Code42 device name will be listed in the Subject: line and Computer Name: line of the Code42 backup alert email. To locate the name of a Code42 device, left-click the Code42 “C” symbol icon in the Windows System Tray, also referred to as the notification area.

Tip

The Windows System Tray or notification area is usually located on the bottom right of the Windows taskbar, next to the displayed digital clock.

For macOS users left-click Code42 “C” symbol icon on the macOS icon menu bar. The Code42 device name will be displayed in the console. Ensure the Code42 application displays the same name as the Code42 backup alert email you received.

This image has an empty alt attribute; its file name is Code-42-Tray-Icon.svg

Code42 “C” symbol icon

Code42 Device Name

After locating the correct specified device stated in the Code42 backup alert email, force a backup of the device by performing the following:

  1. Left-click the “Code42” System Tray or macOS menu bar Icon
This image has an empty alt attribute; its file name is Code-42-Tray-Icon.svg

Code42 Icon

  1. Left-click “Run backup now

Note

The backup may take some time to complete. This depends on the length of time since Code42’s last complete backup and the amount of new data needed to be backed up.

Getting Support

If you require technical support, please contact UTAC (University Technical Assistance Center) and open a service request.

You may submit a service request by one of the following methods:

  • Clicking the “Support” button on top of this page
  • Emailing UTAC at FDUTAC@fdu.edu
  • Calling (973)-443-8822

Last Modified: icon icon Copy Link

The FDU computer labs provide a safe and welcoming study space for our users. The computer labs provide access to technological resources such as: current specialty software applications for a variety of majors, access to online libraries for research, internet access, and print services. Our labs are also available to faculty for instruction in both technology-intensive and non-intensive majors. The computer labs are also used as a venue for various workshops and university programs. The lab hours are flexible to meet the needs of both resident students and commuter students. The lab operations also provide on-campus work opportunities for our students to develop their skills and offer customer service and technical support to our campus community.

FDU Computer Labs Provide:

  • A conducive learning space that enables students to develop the skills necessary for collaboration and teamwork.  
  • Hands on experience with current hardware and software applications used for a variety of majors.
  • Students access to the same technology resources for the purposes of research, printing, and producing professional work.
  • Customer service and on-site technical support from our student staff.
  • Access and opportunities for students to develop their computer skills.
  • Interactive learning opportunities between faculty and students;  theory and application in one setting under the supervision of faculty with the support of student staff.
Last Modified: icon icon Copy Link

Due to the increasing demand of the academic computer facilities, a general document detailing the policies for computer lab reservations has been outlined. The purpose of the computer lab reservation policy is to provide faculty, staff and students with equitable access to campus computing lab resources. Most computer labs are used as classrooms and they are available for open-access use when there are no classes in session.

  1. There are currently four Computing Services computer labs which can be used for classroom instruction on each campus. They are: D206, D207, D208, and D209 located in the Dreyfuss Building on the Florham Campus. The computer labs located on the Metropolitan Campus are: DH2163 and DH2164 in Dickinson Hall and UH Front Lab (UH22) and UH Back Lab (UH28) in University Hall. Also, there are three multimedia labs; two on the Florham campus and one on the Metropolitan campus. The multimedia labs for the Florham Campus are: D211-Animation Lab and ZEN110 – Graphic Design Lab) located in the Dreyfuss and ZEN Buildings. On the Metropolitan campus, the multimedia lab (MML) is located in Becton Hall Room 403. The multimedia labs are primarily used for courses offered by the FDU School of Arts. All labs used for classroom instruction and general use are equipped with a LaserJet printer and data projector. The Animation Lab is equipped with 3-D printers. All multimedia labs are equipped with ZOOM capability to support hybrid instruction.
  2. To reserve a computer lab, a faculty or staff member must submit a Lab Reservation Request, preferably prior to the start of a semester. This form must be submitted by the instructor who will be teaching the course or department personnel. The Computer Lab Reservation Request form is available online at: Forms.fdu.edu. This form must be filled out completely and accurately to prevent processing delays.
  3. Requests for the entire semester are processed on a first come first serve basis. These requests are processed by the Scheduling Officers in the Enrollment Services department.
  4. Requests for specific dates during the semester are processed on a first come first serve basis. These requests are processed by the Lab & Operations Manager in the Computing Services department. If all labs are occupied during the requested time, instructors will be asked to either choose a different date or time or plan to make arrangements with other instructors who have the lab reserved during that time. If an agreement cannot be reached between the instructors, the instructor requesting to use the lab should then approach the Dean of their department with the request. If the Dean is not able resolve the issue, the request should be taken to the Campus Executive for the final decision.
  5. Confirmations will be emailed to the departments or individual instructors making the request. Requests made during the semester will be confirmed based on the preference selected by the requestor on the Lab Reservation Request Form.  The processing time for all lab requests made during a semester is one week.  Please keep this in mind when submitting your lab reservation requests.  To ensure you receive your confirmation in time, submit your reservation one week or more prior to the day the lab is needed.  For instructions on How to Reserve a Computer Lab, please see the article listed below.
  6. Any changes made to the original request in day, time, or location will be treated as a new request.
  7. The requestor is responsible for enforcing all lab rules during the time the lab is scheduled. If a student or faculty member is violating lab rules, the lab assistants have the right to approach the individual at that time.  To prevent interruption during class time, we stress that the lab rules be adhered to by all occupants including faculty and staff.
  8. Faculty and staff who have reserved a lab are responsible for notifying the Lab & Operations Manager if the course or the request has been cancelled. This will allow the Computing Services department to keep an updated and accurate schedule.
  9. If a scheduled class is absent for three consecutive weeks without prior notification, the lab reservation will be cancelled, and future reservations will be subject to further questioning before a confirmation is received.

If you have any questions regarding the lab reservation policy, please contact Lauren Elgin via email at: lauren@fdu.edu.

Last Modified: icon icon Copy Link

Computing Services has multiple computer labs available on both New Jersey Campuses for classroom instruction and student use. Computer Lab hours of operation are subject to change based upon utilization throughout the semester.

All Computing Services Lab hours of operation are:

Metropolitan CampusFlorham Campus
Dickinson Hall – Hackensack
Phone: (201)-692-7111
Fax: (201)-692-7158

Rooms:
Lab A (DH2163),
Lab B (DH2164), Lab C (DH2165)
Dreyfuss Building
Phone: (973)-443-8689
Fax: (973)-443-8886

Rooms:
D206, D207, D208,
D209, D211
University Hall – Teaneck
Phone: (201)-692-7112

Rooms:
Front Lab (UH 22),
Back Lab (UH 28), Side Lab
Monninger Center
Phone: (973)-443-8888

Room:
MONN 228
Student Union Building
Phone: (201)-692-2222

Room:
Multipurpose Room 135

Note

The Student Union Building Multipurpose Room will be locked at all times. To gain access to the Student Union Building computer lab, you must contact Public Safety at (201)-692-2222.

Lab Hours of Operation

Fall Semester 2021 Lab Hours

Dreyfuss, Dickinson Hall, and University Hall. Computer Labs will be open during Fall Recess.
Monday October 11th and Tuesday October 12th 9AM – 5PM

BuildingMonTuesWedThursFriSatSun
Dreyfuss Building8AM – 11PM8AM – 11PM8AM – 11PM8AM – 11PM8AM – 5PM8AM – 5PM12PM – 8PM
Dickinson Hall8AM -11PM8AM – 11PM8AM – 11PM8AM – 11PM8AM – 5PM8AM – 5PMCLOSED
University Hall8AM -11PM8AM – 11PM8AM -11PM8AM – 11PM8AM – 5PM10AM – 5PM12PM – 8PM
Monninger
Center
TBDTBDTBDTBDTBDTBDTBD

Lab computers are available on a first-come-first-serve basis unless reserved for classes.
Class reservations are posted at the lab entrances.

Last Modified: icon icon Copy Link

Confidentiality Agreement and Security Policy

Resources for: Faculty Staff
icon Close

Select employees of Fairleigh Dickinson University may be required to engage with confidential University data.

The FDU Confidentiality Agreement and Security Policy defines your obligations under Federal and State guidelines to preserve the security and confidentiality of this information.

Confidentiality Agreement and Security Policy

Fairleigh Dickinson University regards security and confidentiality of data and information to be of utmost importance. Each individual granted access to electronic and/or hard copy data holds a position of trust and must preserve the security and confidentiality of the information to which he/she is granted access to. Therefore, it is the intent of this policy to ensure that University data, in any format, is not divulged outside of Fairleigh Dickinson University without explicit approval to do so by an Associate Vice-President of the University or higher who has responsibility for the data in question. As such, the University requires all users of data to follow the procedures outlined below:

Policy on Confidential Information

Users of University data are required to abide by all applicable Federal and State guidelines and University policies regarding confidentiality of data, including the Family Education Rights and Privacy Act (“FERPA”) and, as applicable, The Health Insurance Portability and Accountability Act of 1996 (“HIPAA”). For more information, see FERPA and HIPAA).

Confidential Information shall be defined as:

  • regarding student, faculty or staff: any personally-identifiable records, financial records (including social security and credit card numbers), health records; contracts, research data; alumni and donor records; personnel records other than an individual’s own personnel record;
  • regarding the University: University financial data; computer and system passwords, University issued PINS, University proprietary information/data; and
  • any other information for which access, use, or disclosure is not authorized by: 1) federal, state, or local law; or 2) University policy.

The individual receiving the Confidential Information shall have no obligation under this Policy with respect to Confidential Information which:

  • is or becomes publicly available without breach of this Policy by the recipient;
  • is rightfully received by the recipient without obligations of confidentiality; or
  • is developed by the recipient without breach of this Policy; provided, however, such Confidential Information shall not be disclosed until thirty (30) days after written notice of intent to disclose is given to the University officer who has responsibility for the data in question, along with the asserted grounds for disclosure;
  • is disclosed in accordance with any “whistle blower” action as provided in the U.S. False Claims Act, the New Jersey Conscientious Employee Protection Act (“NJCEPA”), or similar legislation. (Brief overview of the NJCEPA is available at here.

Any individual with authorized access to the Confidential Information is given access solely for the business of the University and must not divulge the Confidential Information outside of the University except for University business requirements approved by the President of the University or the division head responsible for the data in question. Specifically, with respect to Confidential Information, individuals must:

  1. Access Confidential Information solely in order to perform his/her job responsibilities.
  2. Not seek personal benefit or permit others to benefit personally from any Confidential Information that has come to them throughout their work assignments.
  3. Not make or permit unauthorized use of any Confidential Information in the University’s information system or other records.
  4. Not enter, change, delete or add data to any information system or files outside of the scope of their job responsibilities.
  5. Not include or cause to be included in any record or report, a false, inaccurate or misleading entry known to the user as such.
  6. Not alter or delete or cause to be altered or deleted from any records, report or information system, a true and correct entry.
  7. Not release Confidential Information other than what is required in completion of job responsibilities which is consistent with this Policy.
  8. Not exhibit or divulge the contents of any record, file or information system to any person unless it is necessary for the completion of their job responsibilities.

It is the individual’s responsibility to immediately report, as outlined under “Information Security Breech and Violation Reporting” at the end of this Policy, if the individual has violated this Policy. Additionally, given the potential harm that the University may suffer with the release of any Confidential Information, all employees are strongly encouraged to report any suspected violation of this policy or any other action, which violates confidentiality of data, as outlined at the end of this policy.

Security Measures and Procedures

All users of University information systems, including Datatel, MS File shares and FDU Office 365 email accounts, are supplied with an individual user account to access the data or systems necessary for the completion of their job responsibilities. Users of the University information systems are required to follow the procedures outlined below:

  1. All transactions, processed by a user ID and password, or PIN, are the responsibility of the person to whom the user ID was assigned. The user’s ID, password, and PIN must remain confidential and must not be shared with anyone.

• Using someone else’s user ID, password or PIN is a violation of policy, no matter how it was obtained.

• Your user ID, password or PIN provides access to information that has been granted specifically to you. To reduce the risk of shared passwords – remember not to post your password or PIN on or near your workstation or share your password or PIN with anyone.

• It is your responsibility to change your password immediately if you believe someone else has obtained it.

Note: If you need your Password or PIN changed, please contact the University Technical Assistance Center (UTAC) 973-443-8822 immediately.

  1. Access to any student or employee information (in any format) is to be determined based on specific job requirements. The appropriate Department Chair, School Director, Department Director/Manager, Dean, Provost, and/or Vice President is responsible for ensuring that access is granted only to authorized individuals, based on their job responsibilities. Written authorization must be received by the Computer Center prior to granting system access.

You are prohibited from viewing or accessing additional information (in any format) unless you have been authorized to do so. Any access obtained without written authorization is considered unauthorized access.

In order to prevent unauthorized use, the user shall log off of all applications that provide access to confidential information, or lock their computer when leaving their workstation. This is especially important during breaks and lunch. Unless there is a specific business need, all workstations should be shut down at the end of the workday.

Note: If you require assistance in establishing your workstation password, please access the screensaver documentation or contact the University Technical Assistance Center (UTAC) at 973-443-8822.

  1. If you have any reason to believe your password or PIN has been compromised or revealed inadvertently, you should change your password and immediately notify one of the individuals as outlined under “Information Security Breech and Violation Reporting” at the end of this policy.

Note: All University’s computer system will periodically prompt you to change your password.

  1. Upon termination or transfer of an employee, Human Resources will notify University Systems and Security, who in turn will notify the appropriate areas in the Computer Center.
  1. Generally, students, temporary employees and consultants should not have access to the University record system. Written approval by the Department Chair, School Director, Department Director/Manager, Dean, Provost, and/or Vice President in charge of the respective area is required if it is determined that access is required. The student, temporary employee or consultant is to be held to the same standards as all University employees, and must be made aware of their responsibilities to protect student and employee privacy rights and data integrity. Written authorization must be received by the Computer Center prior to granting system access.
  1. You agree to properly secure and dispose of any outputs or files you create in a manner that fully protects the Confidential Information.

Additionally, I understand that if granted access to process transactions via Datatel data entry screens, any information I enter or change will be effective immediately. Accordingly, I understand that I am responsible for any changes made using my ID.

I understand that my access to University data is for the sole purpose of carrying out my job responsibilities and Confidential Information is not to be divulged outside of The University, except as previously stated.  Breach of confidentiality, including aiding, abetting, or acting in conspiracy with any other person to violate any part of this policy, may result in sanctions, civil or criminal prosecution and penalties, employment and/or University disciplinary action, and could lead to dismissal, suspension or revocation of all access privileges. I understand that misuse of University data and any violation of this policy or the FERPA, HIPAA or GLB policies are grounds for disciplinary action, up to and including dismissal.  This Agreement shall not abridge nor supersede any rights afforded faculty members under the Faculty Handbook.

Information Security Breech and/or Policy Violation Reporting

If you suspect an Information Security Data Breech or a violation of this policy, report such an event to your department chair or staff supervisor and send an immediate email to violation@fdu.edu. If you do not have immediate access to email, contact the University Technical Assistance Center (UTAC) at 973-443-8822; do not provide details but request a ticket be opened with University Systems & Security due to a information security data breech or policy violation requesting an immediate callback. When practical, also send an email to violation@fdu.edu.


Last Modified: icon icon Copy Link

Connecting a mobile device to the “FDU-Secure” Wireless Network

icon Close

Connecting to “FDU-Secure” Wireless Network with an iOS Device (iPhone and iPad)

  1. Locate and select or tap on the “Settings” app on your iPhone or iPad
  1. Select or tap on “Wi-Fi” within the “Settings” app
  1. Select or tap on “FDU-Secure”, located under the “Choose a Network Menu”
  1. Enter your full FDU e-mail address (ex. faculty@fdu.edu or student@student.fdu.edu) and your NetID password into the proper corresponding text boxes.
  1. Click “Trust” on the top right of screen to accept the security certificate; if you do not complete this step, you will not be able to successfully connect to the FDU-Secure wireless network.
  2. Note that “FDU-Secure” has a check mark under “Wi-Fi”, if so, you have successfully connected to “FDU-Secure” wireless network

Connecting to “FDU-Secure” Wireless Network with an Android Phone

  1. Swipe down twice from the top of your screen.
  1. Locate, then press and hold the Wi-Fi icon.
  1. Select “FDU-Secure” From the list of nearby networks.
  1. Fill in the information as seen on the photo.
EAP MethodPEAP
Phase 2 AuthenticationMSCHAPV2
CA CertificateUse system certificates
NOTE: Some devices do not have this option. Instead select “Do not validate”
Domainroot.fdu.edu
IdentityYour FDU e-mail address
Anonymous Identity Can be ignored
PasswordYour FDU email password
  1. If your device does not have system certificates installed and you select “Do not validate” you will see a warning message about security/privacy. It is safe to connect to our network, this is just a general message from the operating system.
  1. Press connect
Last Modified: icon icon Copy Link

Connecting and Using an All-in-One at Home

Resources for: Staff
icon Close

How to Connect an All-in-One for Work-at-Home

Making the Physical Connections

  1. Make the appropriate connections to the back of the all-in-one.
    • Plug in the power cable to the power port on the back of the all-in-one.
    • A physical network connection is only required if you do not want to or can not use wireless.
    • Both the keyboard and mouse can be plugged into any USB port.
  1. Turn the PC on and sign in as normal.

Connecting to Wi-fi (Skip if Using a Physical Network Cable)

  1. Click on the network icon on the bottom-right hand of the Start bar near the system clock.
  1. A list of available networks will populate. Select your home wireless network.
  1. Select your network and click “Connect“.
  1. Enter the network key for your wireless router. This can sometimes be located on the side or bottom of your router and/or modem. Click “Next“.

Connecting to VPN from Home

  1. Click on the arrow on the bottom right hand of the Start bar near the system clock and right-click on the “Cisco VPN Access” icon. On the pop-up menu, click “Connect“.
  1. If this is the first time connecting to VPN service please enter the text below as shown into the VPN field and click “Connect“.
  1. Enter your full NetID information and click “Ok“.
  1. Once a successful connection is made a prompt will appear and the icon for the Cisco VPN Access in the system try will appear with a lock.

Last Modified: icon icon Copy Link

Fairleigh Dickinson University vigorously enforces United States copyright law. When utilizing the FDU Local Area Network or FDU provided Internet Access, you are required to adhere to all existing US copyright laws.

To view the full statement of law, please visit:

Failure to comply with this document can result in FDU disciplinary action as well as civil and criminal penalties.

Last Modified: icon icon Copy Link

Cost Associated with Production and Post Production

icon Close

Video Production

Multimedia Services operates as a cost recovery center. We are not a profit center, so our pricing is significantly less than any outsourced production, while offering exceedingly high production values.
Pricing for a single or two camera production are $350.00 per day, per camera.

Post Production

Post Production costs are charged at the rate of $45.00 per hour. Depending upon complexity, running time and the number of preview adjustments, the average time to edit a project is between 4 and 6 hours.

ADA

All videos that will be distributed on line must be ADA compliant. This includes closed captions and transcription. The charges for this service are $1.00 per minute of video for captions and transcriptions respectively.

Last Modified: icon icon Copy Link

Create and Share Office 365 Documents through OneDrive

icon Close

Whether you’re working at home or the office, OneDrive makes it easy to create new documents and share your files. You can even collaborate with others on a document.

In the following external article, you’ll learn how to create documents and folders. It will go over how to share your files with different groups of people, as well as the various collaboration tools available in Office 365.

Last Modified: icon icon Copy Link

Select your browser below to learn how to delete your web browser cookies.

  • Google Chrome

    Click on the three dots and select Settings.Select Advanced to show the advanced settings. Select Content settings.Select Cookies.Click the garbage can icon to delete the cookies.

  • Mozilla Firefox

    Click on the three lines and select OptionsSelect the Privacy & Security tab and click Manage Data found under Cookies and Site Data.Select fdu.edu and select Remove Selected, select Save Changes when finished.

  • Safari

    Open Safari Preferences and select the Privacy tab.Select Manage Website DataSelect fdu.edu and click Remove.

  • Internet Explorer

    Click on the Settings “Gear” located on the top right of the browser, select Internet OptionsDelete in the Browser History sectionUncheck all boxes listed, except Cookies and website data, click Delete when finished

Last Modified: icon icon Copy Link

Last Revision: 02/07/2020

I. OBJECTIVE

In an effort to maintain the reputation, security, continuity, and technical oversight of university assets considered part of our overall catalog of services, the Office of Information and Resource Technology is issuing a new policy concerning domain names affiliated with Fairleigh Dickinson University.  Affiliation with FDU is determined by OIRT in conjunction with the Offices of General Counsel and Communications and Marketing.

II. POLICY

All domain registrations that have an affiliation with the University must be registered through OIRT. An affiliation is defined as a domain that identifies the University as part of its naming nomenclature and houses content specific to the University or any function, whether administrative, academic, or student related to the University. To request a new domain, please complete the Domain Registry Form at forms.fdu.edu or email your questions to domainregistrar@fdu.edu.

In addition to the domain registration, ongoing certification renewals and any backend technical configurations will be managed by OIRT. All costs associated with the domain will be charged back to the department.

Any department that today independently manages/operates a University domain as defined above or has obtained a domain with any affiliation with FDU must notify OIRT of the existence of that domain so ownership can be moved over to OIRT management. Please contact OIRT by sending all available information to domainregister@fdu.edu. A member of OIRT will work with the department to move the ownership over properly.All content of any domain, as well as plug-ins or any other functionality of the domain, will be reviewed by OIRT, but are the responsibility of the individual departments.

III. IN CASE OF QUESTIONS

All questions relating to the Domain Registration Policy can be addressed to the VP & CIO of Fairleigh Dickinson University.


Last Modified: icon icon Copy Link

Duo Two-Factor Authentication

DUO two-factor authentication adds a second layer of security to your FDU NetID. It requires two factors to verify identity. These factors include something you know – your FDU NetID and password, and something you have – a phone or passcode, to authenticate and gain access to your account on FDU services. Passwords alone no longer provide adequate protection against cyber hacking. DUO is required for all current FDU students. Please follow the steps below.

Install Duo Mobile App

The DUO app is available for mobile phones and iPads. You can directly access the Duo Mobile Security App at the links below.

Activate your DUO Account

NOTE: This step requires a Desktop or Laptop browser.

  1. In a Desktop or Laptop browser visit the DUO Management Portal to begin the activation process by enrolling your device.  Activation requires scanning a QR code with the Duo app’s built-in scanner
  1. Duo prompts you to enroll the first time you visit the DUO Management Portal using a browser or a client application that shows the interactive Duo web-based prompt

Supported Browsers: Chrome, Firefox, Safari, Edge, Opera, and Internet Explorer 8 or later. Some browsers do not support all of Duo’s authentication devices (for example, Security Keys won’t work with Internet Explorer). For the widest compatibility with Duo’s authentication methods, we recommend recent versions of Chrome and Firefox.

  1. Click “Start setup” to begin enrolling your device
  1. Select the type of device you’d like to enroll and click “Continue“. We recommend using a smartphone for the best experience, but you can also enroll iOS/Android tablets
Duo - Choose Your Authentication Device Type
  1. Select your country from the drop-down list and type your phone number. Use the number of your smartphone or cell phone that you installed the Duo Mobile Security App on in the Step 1
  1. Double-check that you entered it correctly, check the box, and click “Continue
Duo - Type Your Phone Number

NOTE: If you’re enrolling a tablet you aren’t prompted to enter a phone number.

  1. Choose your device’s operating system and click “Continue“.
Duo - Choose Platform
  1. Click “I have Duo Mobile installed”
  • If you have not completed installing the Duo Mobile App in Step 1 please complete now by following the platform-specific instructions on the screen. After installing the app return to the enrollment window
  1. Activating the app links it to your account so you can use it for authentication
  1. On iPhone, Android, and Windows Phone activate Duo Mobile by scanning the barcode with the app’s built-in barcode scanner. Follow the platform specific instructions for your device:
  1. The “Continue” button is clickable after you scan the barcode successfully
  • Can’t scan the barcode? Click “Or, have an activation link emailed to you instead” and follow the instructions
  1. Once activated click “Continue” to complete registration

Configure Device Options (Optional)

  1. You can use Device Options to give your phone a more descriptive name, or you can click “Add another device” to start the enrollment process again and add a second phone or another authenticator
  • If this is the device you’ll use most often with Duo then you may want to enable automatic push requests by changing the “When I log in:” option and changing the setting from “Ask me to choose an authentication method” to “Automatically send this device a Duo Push” and click “Save“. With one of the automatic options enabled Duo automatically sends an authentication request via push notification to the Duo Mobile app on your smartphone.
  1. Your device is ready to approve Duo push authentication requests. Click “Send me a Push” to give it a try. All you need to do is tap “Approve” on the Duo login request received at your phone

With DUO activated on your account, and with your device enrolled, you are ready to use DUO. When logging in, you will have two authentication options. Review the options below to determine what works best for you.

TIPS: We recommend the push notification to your smartphone, it’s the easiest. You can also check the box “Remember Me for 60 Days” to only perform the authentication once every two months on that device.


Authentication Options

There are two ways you can use DUO:

Push Notification

Once the DUO mobile app is installed, you can select to receive a DUO notification on your smartphone. Open the notification, and you’ll see a green checkmark, and a red X. Simply tap the “Green Checkmark” to gain access.

Passcodes

You can use the DUO mobile app to generate passcodes. This option does not require wifi or data, so this is a great option if you’re traveling or if you have limited or no cell/internet service. Open your DUO mobile app, tap the FDU logo and it will reveal a passcode. During login, choose the enter a passcode option, enter the code and you’re in.

If you do not have your device with you, don’t worry. You can contact the University Technical Assistance Center (UTAC) at (973)-443-8822 for a temporary passcode. These passcodes can be entered in the DUO prompt on your computer.


How Do I Change Settings or Enroll Another Device?

To change settings or enroll another device, visit DUO Management Portal or any DUO-supported application. When you get to the DUO prompt, click the “Settings” button and choose to add a new device or access your settings.

Last Modified: icon icon Copy Link

Echo360 helps instructors capture and extend those moments to improve student engagement before, during and after class.

Through our technology platform, students have 24/7 access to classroom discussion, presentation materials, and the lecture itself.

Getting Started with “Echo 360 Universal Capture: Personal

Universal Capture: Personal is a stand-alone application designed to be used by instructors on their personal computers to generate video recordings. The software enables you to create video recording across multiple computing platforms via a unified interface. That means instructors can record and share video on Mac and Windows computers, inside or outside of the classroom, with an identical user experience on each device.

For those faculty members who do not yet have an Echo 360 account, it is necessary for you to login to Webcampus first. Therefore, please follow the directions below in order for you to have access to Echo360 environment. Once you have completed these steps via webcampus, thereafter users will be able to login directly to echo360.fdu.edu with their FDU NetID credentials.

Note

For those who already have an account in Echo360 please go to Step 13.

  1. Login to Webcampus using your FDU NetID
  2. Click on “Your Course
  3. Click on “Course Documents
  1. Click on “Tools
  2. Click on “Echo360 Cloud
  1. In this page, enter a Name that makes it clear this is the link for Echo360 class content, for example: “Echo360 Recordings”
  2. Click “Submit
  1. A new link will appear on your Course Documents page titled “Echo360 Recordings“. This maybe at the bottom of the Course Documents page
  2. Click on the “Echo360 Recordings” link. This will redirect you to the Echo environment
  1. Click on the “Gear Icon” on the top right
  2. Click on “Downloads
  1. From the Universal Capture: Personal area of the Downloads page, select the link to download the installer appropriate for the type of computer/operating system you are running. After you have downloaded the personal capture, follow the instructions on how to capture your lectures using this tool
  1. Once you have installed the software, please launch the Universal Capture: Personal application. If you see the following login screen, click on the link and login with your FDU NetID credentials
  1. After logging in select the inputs you want to capture from the two drop down menu. If the drop down menu says No Input just select the option you want from the available sources
    • Left Input: Click on the dropdown menu to select your input for the left video channel (e.g. display, webcam, etc.).
    • The bars in the middle shows the volume levels of the audio capture.
    • Right Input: Click on the dropdown menu to select your input for the right video channel (e.g. display, webcam, etc.).
    • The Display option from the drop down menu chooses the application that you want to record from your computer for example a PowerPoint presentation.
    • Preview the inputs on the screen; to be sure, they will record properly.
  1. Click the “Pencil Icon” or title to launch the Capture Details dialog box
  1. Enter a Title, add a Description or Tags and select a Publishing location for the recording. By default, your recordings are published to your “Library” folder
  2. Click “Save
  1. At this point, if you are going to present any materials via PowerPoint, Web or any other applications open it and minimize it
  2. When you are ready, click the “Record” button. You will have 5 seconds before recording starts so you can switch to the material you want to present
  1. During a recording, you will have the option to Stop, Pause, or Cancel recording. Do not stop recording until you are totally finished with the session. If you click on the cancel button, it will cancel the entire recording
  • Once you stop the recording, you will receive a message and you can click on the “Close” option to exit the program. Once your recording process is finished, it will automatically publish to the location that you have specified. You will receive an email when processing is finished and you are able to view your recording

Viewing Recording

Once you receive the email, your video is online and ready to be viewed.

  1. Log back into echo360.fdu.edu
  2. Click on the “My Content” tab on the left side of the window.
  3. Click on the recording that you want to view
  1. If you want users to view your recording, scroll down towards the bottom of the screen to the “Links” section. Copy the link and you can send it to users via email
Last Modified: icon icon Copy Link

Accessing Ellucian COLLEAGUE

COLLEAGUE uses single sign-on protocol for users to login. The login or user ID consists of the first part of the FDU NetID up until the @ sign in the NetID.

For instance, if your NetID webmail address is john.q.public@fdu.edu your COLLEAGUE login ID would be “john.q.public

The password would be the exact same one that you use with your FDU NetID.

Last Modified: icon icon Copy Link

Virtru email encryption is the preferred method to send and view encrypted emails and files with your FDU email address. Available for FDU Faculty and Staff upon request. Click the link below to request access to Virtru Email Encryption.

The Virtru Email Encryption Tutorial will help users navigate installation, basic use, different usage scenarios, and common technical questions.

Alternative Approved Methods for Encryption

If you are not approved for Virtru email encryption, the articles below are alternative, FDU OIRT and DSIRT approved methods for encrypting Microsoft Office and Adobe PDF files and comply with the University WISP.

Warning Warning

According to FDU’s Written Information Security Program (WISP), in no case should they be sending or storing WISP protected information without the explicit authorization of the Chief Information Security Officer (CISO). If approved, these instructions will provide you with guidance on the methodology.

For more information, visit the link at the bottom of the page.

Last Modified: icon icon Copy Link

Encrypting Word, Excel & PDF Files with built-in Application Encryption

Resources for: Faculty Staff
icon Close

Follow these easy to use instructions for encrypting Word, Excel, and Acrobat files using built-in features.

Word & Excel

  1. For Word and/or Excel files, first click on File on the upper left-hand corner
  1. Under the Info tab, click on Protect Document for Word and Protect Workbook for Excel followed by Encrypt with Password
  1. Enter a password in the pop-up window. Re-enter the password in the next window to confirm
  1. The below message will confirm your document has been password-protected
  1. To open a password-protected file, double-click on the file and enter the created password

PDF Files

NOTE:

Adobe Acrobat Pro DC or Adobe Acrobat for macOS is needed to encrypt PDF files with a password. This feature is not available in the free version of Adobe Acrobat Reader DC.

  1. Select Tools on the Navigation Tab and then select Protect
  1. On the Protect Tab select Encrypt
  1. Select Encrypt with Password. Then select Yes on the security pop-up window
  1. Check Require a Password to Open the Document and then choose a strong password. Under compatibility, choose Acrobat X and later to change the encryption method to 256-bit.
  1. Confirm the password when requested. Please note that the document WILL NOT be fully encrypted until it is saved
  1. To open the file, double-click the file and enter the created password.
Last Modified: icon icon Copy Link
binoculars icon
binoculars icon Couldn’t find what you were looking for?
Submit a ticket and our Support Service Team will contact you to assist.
background