Resources

Explore our comprehensive IT resource library to discover a wealth of helpful information tailored to your needs. Utilize our filters to refine your search by role at FDU, department, or specific service for a more personalized experience.

Support
Resources Header

Confidentiality Agreement and Security Policy

Resources for:
icon Close

Effective Date: 11/07/2023
Last Revision: 11/01/2013

Select employees of Fairleigh Dickinson University may be required to engage with confidential University data. The FDU Confidentiality Agreement and Security Policy defines your obligations under Federal and State guidelines to preserve the security and confidentiality of this information.

Confidentiality Agreement and Security Policy

Fairleigh Dickinson University regards the security and confidentiality of data and information to be of utmost importance. Each individual granted access to electronic and/or hard copy data holds a position of trust and must preserve the security and confidentiality of the information to which he/she is granted access to. Therefore, it is the intent of this policy to ensure that University data, in any format, is not divulged outside of Fairleigh Dickinson University without explicit approval to do so by an Associate Vice-President of the University or higher who has responsibility for the data in question. As such, the University requires all users of data to follow the procedures outlined below:

Policy on Confidential Information

Users of University data are required to abide by all applicable Federal and State guidelines and University policies regarding confidentiality of data, including the Family Education Rights and Privacy Act (“FERPA”) and, as applicable, The Health Insurance Portability and Accountability Act of 1996 (“HIPAA”). For more information, see: FDU’s General Confidentiality Policy, FERPA and HIPAA.

Confidential Information shall be defined as:

  • regarding student, faculty or staff: any personally-identifiable records, financial records (including social security and credit card numbers), health records; contracts, research data; alumni and donor records; personnel records other than an individual’s own personnel record;
  • regarding the University: University financial data; computer and system passwords, University issued PINS, University proprietary information/data; and
  • any other information for which access, use, or disclosure is not authorized by: 1) federal, state, or local law; or 2) University policy.

The individual receiving the Confidential Information shall have no obligation under this Policy with respect to Confidential Information which:

  • is or becomes publicly available without breach of this Policy by the recipient;
  • is rightfully received by the recipient without obligations of confidentiality; or
  • is developed by the recipient without breach of this Policy; provided, however, such Confidential Information shall not be disclosed until thirty (30) days after written notice of intent to disclose is given to the University officer who has responsibility for the data in question, along with the asserted grounds for disclosure;
  • is disclosed in accordance with any “whistle blower” action as provided in the U.S. False Claims Act, the New Jersey Conscientious Employee Protection Act (“NJCEPA”), or similar legislation. (Brief overview of the NJCEPA is available here.

Any individual with authorized access to the Confidential Information is given access solely for the business of the University and must not divulge the Confidential Information outside of the University except for University business requirements approved by the President of the University or the division head responsible for the data in question. Specifically, with respect to Confidential Information, individuals must:

  1. Access Confidential Information solely in order to perform his/her job responsibilities.
  2. Not seek personal benefit or permit others to benefit personally from any Confidential Information that has come to them throughout their work assignments.
  3. Not make or permit unauthorized use of any Confidential Information in the University’s information system or other records.
  4. Not enter, change, delete or add data to any information system or files outside of the scope of their job responsibilities.
  5. Not include or cause to be included in any record or report, a false, inaccurate or misleading entry known to the user as such.
  6. Not alter or delete or cause to be altered or deleted from any records, report or information system, a true and correct entry.
  7. Not release Confidential Information other than what is required in completion of job responsibilities which is consistent with this Policy.
  8. Not exhibit or divulge the contents of any record, file or information system to any person unless it is necessary for the completion of their job responsibilities.

It is the individual’s responsibility to immediately report, as outlined under “Information Security Breach and Violation Reporting” at the end of this Policy, if the individual has violated this Policy. Additionally, given the potential harm that the University may suffer with the release of any Confidential Information, all employees are strongly encouraged to report any suspected violation of this policy or any other action, which violates confidentiality of data, as outlined at the end of this policy.

Security Measures and Procedures

All users of University information systems, including Datatel, MS File shares and FDU Office 365 email accounts, are supplied with an individual user account to access the data or systems necessary for the completion of their job responsibilities. Users of the University information systems are required to follow the procedures outlined below:

  1. All transactions, processed by a user ID and password, or PIN, are the responsibility of the person to whom the user ID was assigned. The user’s ID, password, and PIN must remain confidential and must not be shared with anyone.
    • Using someone else’s user ID, password or PIN is a violation of policy, no matter how it was obtained.
    • Your user ID, password or PIN provides access to information that has been granted specifically to you. To reduce the risk of shared passwords – remember not to post your password or PIN on or near your workstation or share your password or PIN with anyone.
    • It is your responsibility to change your password immediately if you believe someone else has obtained it.

NOTE: If you need your Password or PIN changed, please create a SAMI Support ticket via SAMISupport.fdu.edu. If you are unable to log into SAMI Support via your Net ID username and password, please use the public form.

  1. Access to any student or employee information (in any format) is to be determined based on specific job requirements. The appropriate Department Chair, School Director, Department Director/Manager, Dean, Provost, and/or Vice President is responsible for ensuring that access is granted only to authorized individuals, based on their job responsibilities. Written authorization must be received by the Computer Center prior to granting system access.
    • You are prohibited from viewing or accessing additional information (in any format) unless you have been authorized to do so. Any access obtained without written authorization is considered unauthorized access.
    • In order to prevent unauthorized use, the user shall log off of all applications that provide access to confidential information, or lock their computer when leaving their workstation. This is especially important during breaks and lunch. Unless there is a specific business need, all workstations should be shut down at the end of the workday.

NOTE:  If you require assistance in establishing your workstation password, please access the screensaver documentation or contact SAMI Support Desk.

  1. If you have any reason to believe your password or PIN has been compromised or revealed inadvertently, you should change your password and immediately notify one of the individuals as outlined under “Information Security Breach and Violation Reporting” at the end of this policy.

NOTE: All University’s computer system will periodically prompt you to change your password.

  1. Upon termination or transfer of an employee, Human Resources will notify University Systems and Security, who in turn will notify the appropriate areas in the Computer Center.
  1. Generally, students, temporary employees and consultants should not have access to the University record system. Written approval by the Department Chair, School Director, Department Director/Manager, Dean, Provost, and/or Vice President in charge of the respective area is required if it is determined that access is required. The student, temporary employee or consultant is to be held to the same standards as all University employees, and must be made aware of their responsibilities to protect student and employee privacy rights and data integrity. Written authorization must be received by the Computer Center prior to granting system access.
  1. You agree to properly secure and dispose of any outputs or files you create in a manner that fully protects the Confidential Information.

Additionally, I understand that if granted access to process transactions via Datatel data entry screens, any information I enter or change will be effective immediately. Accordingly, I understand that I am responsible for any changes made using my ID.

I understand that my access to University data is for the sole purpose of carrying out my job responsibilities and Confidential Information is not to be divulged outside of The University, except as previously stated. Breach of confidentiality, including aiding, abetting, or acting in conspiracy with any other person to violate any part of this policy, may result in sanctions, civil or criminal prosecution and penalties, employment and/or University disciplinary action, and could lead to dismissal, suspension or revocation of all access privileges. I understand that misuse of University data and any violation of this policy or the FERPA, HIPAA or GLB policies are grounds for disciplinary action, up to and including dismissal. This Agreement shall not abridge nor supersede any rights afforded faculty members under the Faculty Handbook.

Information Security Breach and/or Policy Violation Reporting

If you suspect an Information Security Data Breach or a violation of this policy, report such an event to your department chair or staff supervisor and send an immediate email to violation@fdu.edu. If you do not have immediate access to email, contact the SAMI Support Desk; do not provide details but request a ticket be opened with University Systems & Security due to an information security data breach or policy violation requesting an immediate callback. When practical, also send an email to violation@fdu.edu.


Last Modified:

Connecting a Non-PC Device to Wi-Fi

Resources for:
icon Close

This article is intended for students, staff, and faculty who wish to connect their non-PC, IoT, gaming, or streaming devices to the FDU-Wireless network. Devices that require registration include gaming consoles (such as Xbox, PlayStation, Switch) and streaming devices (like Amazon Fire Stick, Apple TV, and Roku).

Note

FDU-Wireless is only for non-PC, IoT, gaming, or streaming devices that do not support WPA2 Enterprise authentication or features a web browser.

Registering a Non-PC Device for use on FDU-Wireless Network

Use the link and directions below to register and manage wireless network access for your non-PC devices.

  1. Sign in into FDU MyDevices portal using the link below using your FDU NetID. Make sure to check “I agree to the terms and conditions” button before clicking “Sign On

FDU MyDevices Portal

  1. Select “Add” to begin registering a device
  1. Enter your device type and your device’s MAC Address into the corresponding text boxes. An optional description may be entered for your device as well. Your device’s MAC Address must be entered to register the device and continue. Refer to your devices manufacture for instructions on how to obtain the devices MAC Address. When finished, select “Submit

Tip

Some devices have their MAC Address labeled alongside it’s Serial number.

Your device should now be listed on MyDevices Portal and allowed to connect to the FDU-Wireless network. It may be necessary to select the FDU-Wireless network on your device or restart your device before successfully connecting to the wireless network

Note

Once your device is added, the status will always remain as Pending. However you will be able to connect the device to FDU-Wireless regardless of this status.

Last Modified:

Connecting and Using an All-in-One at Home

Resources for:
icon Close

How to Connect an All-in-One for Work-at-Home

Making the Physical Connections

  1. Make the appropriate connections to the back of the all-in-one.
    • Plug in the power cable to the power port on the back of the all-in-one.
    • A physical network connection is only required if you do not want to or can not use wireless.
    • Both the keyboard and mouse can be plugged into any USB port.
  1. Turn the PC on and sign in as normal.

Connecting to Wi-fi (Skip if Using a Physical Network Cable)

  1. Click on the network icon on the bottom-right hand of the Start bar near the system clock.
  1. A list of available networks will populate. Select your home wireless network.
  1. Select your network and click “Connect“.
  1. Enter the network key for your wireless router. This can sometimes be located on the side or bottom of your router and/or modem. Click “Next“.

Connecting to VPN from Home

  1. Click on the arrow on the bottom right hand of the Start bar near the system clock and right-click on the “Cisco VPN Access” icon. On the pop-up menu, click “Connect“.
  1. If this is the first time connecting to VPN service please enter the text below as shown into the VPN field and click “Connect“.
  1. Enter your full NetID information and click “Ok“.
  1. Once a successful connection is made a prompt will appear and the icon for the Cisco VPN Access in the system try will appear with a lock.
Last Modified:

Connecting to FDU-Guest Wi-Fi

Resources for:
icon Close

Visitors can get online in just three quick steps using a browser-based portal with a single click to accept the guest policy on New Jersey Campuses.

The FDU-Guest network provides fast, on-campus public internet access for users who do not require access to internal FDU resources.

How to Connect to FDU-Guest WiFi

  1. Navigate to your devices WiFi settings and select the SSID Network: “FDU-Guest”
  2. A Captive Portal will open automatically

Note

If your web browser is already open, it will be redirected automatically to the Captive Portal.

  1. On the Captive Portal page, review and accept the User Acceptable Policy to complete your connection

Once the policy is accepted, your device will be connected to the FDU-Guest network.

Network Access Limitations

Note

The FDU-Guest network provides public internet access only. It does not allow access to FDU internal systems, file servers, or other restricted university resources.

For access to FDU network resources, use our secure connection methods or contact SAMI Support for assistance.

Last Modified:

Connecting to FDU-Secure Wi-Fi

Resources for:
icon Close

FDU-Secure uses current encryption standards to connect to the FDU network via secure wireless traffic. As a result, FDU-Secure is the preferred method of accessing the on-campus Wireless network if you are Faculty, Student, or Staff member. To connect to the FDU-Secure Wireless Network, you will need an FDU NETID (username@fdu.edu or username@student.fdu.edu).

Below are the necessary steps to connect to the FDU-Secure Wireless Network, specified for various device types:

Windows
  1. Select the “Internet Symbol” located at the right-hand side of the “task bar”
  1. Select “FDU-Secure” from the pop-up menu
  1. Enter “FDU Net ID and Password” and press “OK”
  1. When prompted with “Continue connecting?” press “Connect”
close
macOS
  1. Select the “Wi-Fi Symbol” located at the right-hand side of the “menu bar”
  1. Select “FDU-Secure” from the drop-down menu
  1. Enter “FDU Net ID and Password” and press “OK”
  1. When prompted with “Verify Certificate” press “Continue”
close
iOS
  1. Select the “Wi-Fi” tab located in the “Settings” app
  1. Select “FDU-Secure” from the list of available networks
  1. Enter “FDU Net ID and Password” and press “Join”
  1. When prompted with “Certificate” press “Trust”
close
Android
  1. Select the “Connections” tab located in the “Settings” app
  1. Press “Wi-Fi”
  1. Select “FDU-Secure” from the list of available networks
  1. Enter “FDU Net ID and Password”
  1. Press “CA certificate” then press “Use System Certificates” drop the drop down menu
  1. Input “fdu.edu” in the domain field and press “Connect”
close
Last Modified:

Connecting to FDU’s Wireless Networks

Resources for:
icon Close

The following guides provide an overview of connecting to Fairleigh Dickinson University’s wireless network. Whether you’re a guest, staff, or student, using FDU-owned or personal devices, these articles provide essential steps for secure and efficient connectivity across various equipment, including non-PC and mobile devices.

Connect to FDU-Secure Wi-Fi

Follow these steps to connect to the FDU-Secure wireless network, which adheres to the latest encryption standards.

Connecting to FDU-Secure Wi-Fi


Connect to FDU-Guest Wi-Fi

Follow these steps to connect to the FDU-Guest wireless network.

Connecting to FDU-Guest Wi-Fi


Connect a Non-PC Device to Wi-Fi

Follow these steps to connect various non-PC devices, including IoT, gaming, and streaming gadgets, to FDU’s wireless network.

FDU-Wireless for Non-PC Devices


Connect to FDU Wireless as a Guest (Vancouver)

Follow these steps to create a guest wireless account, ensuring secure and convenient access for our Vancouver campus visitors.

FDU-Wireless for Guests


View where our Wireless networks are available on our NJ Campuses:

Last Modified:

Copyright Enforcement Policy

Resources for:
icon Close

Fairleigh Dickinson University vigorously enforces United States copyright law. When utilizing the FDU Local Area Network or FDU provided Internet Access, you are required to adhere to all existing US copyright laws.

To view the full statement of law, please visit:

Failure to comply with this document can result in FDU disciplinary action as well as civil and criminal penalties.

Last Modified:

Cost Associated with Production and Post Production

Resources for:
icon Close

Production Services

Multimedia Services operates as a cost recovery center, ensuring our pricing remains competitive and significantly lower than external video production studios, without compromising on production value.

Our pricing structure is straightforward: video production services are offered at a flat rate of $150.00 per hour, making high-quality production accessible and affordable.

Post Production

When it comes to post-production, our rates are equally transparent, set at a flat rate of $50.00 per hour. The total time required for editing a project can vary, but on average, it ranges between 20 to 30 hours, depending on the complexity of the project, its duration, and the number of revisions needed during the preview stages.

ADA Captioning

In line with ensuring all online distributed videos are ADA compliant, our services include closed captioning and transcription. While platforms like YouTube automatically generate captions, they might not always be perfectly accurate. For videos requiring 100% accuracy in transcription, or for content hosted on platforms other than YouTube, we offer professional transcription services at an additional cost to meet all accessibility standards.

Last Modified:

CrashPlan Backup Email Alert

Resources for:
icon Close

Backup Alert Email Notifications

CrashPlan Backup will send users an email alert notifying them of any incomplete backups of their devices.

  • The CrashPlan Backup email alert will be sent from “CrashPlan <noreply@crashplan.com>
  • The Subject line of the email will be labeled with: “[External]Critical: [Name of Device] not backed up

Backup Alert

You will receive an alert when your computer hasn’t backed up to CrashPlan for 5 calendar days. The email will look like the example below:

CrashPlan Backup Alert Email Notification

What to do if you get a backup alert

After receiving a CrashPlan Backup alert email, you should locate the device the email specifies in need of backup. The CrashPlan Backup device name will be listed in the Subject: line and Computer Name: line of the CrashPlan backup alert email.

For Windows Devices

To locate the name of a CrashPlan Backup device:

  1. Click the CrashPlan Backup icon in the Windows System Tray, also referred to as the notification area.

CrashPlan Backup icon

  1. Click “Run Backup now

Tip

The Windows System Tray or notification area is usually located on the bottom right of the Windows taskbar, next to the displayed digital clock.

Ensure the CrashPlan backup application displays the same name as the CrashPlan Backup alert email you received.

close
For macOS Devices

After locating the correct specified device stated in the CrashPlan backup alert email, force a backup of the device by performing the following:

  1. Click the “CrashPlan Backup” System Tray or macOS menu bar Icon

CrashPlan Backup Icon

  1. Click “Run Backup now

Note

The backup may take some time to complete. This depends on the length of time since CrashPlan Backup’s last completed backup and the amount of new data that needs to be backed up.

close
Last Modified: