Procedure for reporting a threatening or harassing landline call.
Service: Faculty
Responsible Office: Data Security Incident Response Team (DSIRT)Responsible Official: Chief Information Officer, Chief Information Security OfficerDSIRT Approval: Neal M. Sturm on behalf of DSIRT Effective Date: 12/01/2022Last Review Date: 11/22/2022Last Revision Date: 11/22/2022 (1) Nonpublic personal information means: (i) personally identifiable financial information; and (ii) any list, description, or other grouping of consumers (and publicly…
Being connected to the internet suggests that the internet is connected to you. Without concern and proper safeguards to protect the information you share, you are at a greater risk of cybercrime. The university assumes its share of responsibility to protect sensitive information but you must do the same. The vast majority of data and…
See also
SAMI Shorts are brief informational videos that provide key insights on a variety of IT-related topics. Most videos run 45–90 seconds, include closed captioning, and are also available in text format. As new SAMI Shorts are released, we will periodically share them with the community via email. You may also receive a related SAMI Short…
See also
The SAMI Support portal requires a valid NetID and password, along with DUO multi-factor authentication, for access. Upon entry, users can create new tickets, review open or closed requests, and explore the IT Knowledgebase for solutions to common issues. Access the support portal using the button below: If you need to open a request and…
See also
Introduction This document outlines the university approved process for securely deleting Personal Information (PI) and Protected Health Information (PHI) after the PI or PHI has been encrypted. Prerequisite Eraser Portable® Secure Data Remove software needs to be installed on your computer. Please contact the SAMI Support Desk to request the installation of this software. A…
See also
This document outlines the University approved process for securely encrypting Personally Identifiable Information (PII). Prerequisite 7Zip software needs to be installed on the end user’s computer. Please contact the SAMI Support Desk to request the installation of this software. If justification is needed, notify the service desk that 7Zip is needed to encrypt documents containing…
See also
Self-Service is an interactive web application that enables students, faculty, and staff to view their individual information contained in FDU’s student information system. Students can use Self-Service to do things like view their financial aid, pay their bills, and register for classes. Likewise, faculty will use Self-Service to verify enrollment and enter grades. To navigate…
See also
According to FDU’s Written Information Security Program (WISP), in no case should they be sending or storing WISP protected information without the explicit authorization of the Chief Information Security Officer (CISO). If approved, these instructions will provide you with guidance on the methodology. Instructions for Windows If you do not have a university issued laptop…
See also
Setting up a security key for Duo authentication ensures a higher level of protection for your online accounts. This guide walks you through the process step by step, helping you seamlessly integrate this secure method into your two-factor authentication system. Setting up a Security Key for DUO Authentication Recommended Security Keys For enhanced security and…