Service: Students

Accept a New Certificate for FDU-Secure Wireless Network

FDU-Secure uses current encryption standards to connect to the FDU wireless network via secure wireless traffic.

Last Modified: icon icon Copy Link

Acceptable Use Policy for Computer Usage

Original Effective Date: 02/17/2013Revised Date: 12/20/2021 The computing and electronic communications facilities at Fairleigh Dickinson University support the instructional, research, and administrative activities of the University. Users of these facilities may have access to University resources, sensitive data, and external networks. Consequently, it is imperative for all users to behave in a responsible, ethical, and…

Last Modified: icon icon Copy Link

Accessing an FDU Email Account on a Mobile Device Using the Outlook App

The easiest way to access your FDU email account on your mobile device is to install the Outlook app from either the App Store (Apple) or the Play Store (Android)

Last Modified: icon icon Copy Link

All video projects produced by Multimedia Services must be closed captioned and transcribed.

Last Modified: icon icon Copy Link

Adding a FDU Email Account to a Mobile Device’s Native ‘Mail’ App

Add an FDU Faculty/Staff E-mail account with iOS or Android.

Last Modified: icon icon Copy Link

Verizon Audio Conferencing service allows you to hold a meeting by phone at any time.

Last Modified: icon icon Copy Link

B-Roll is supplemental footage inserted as a cutaway under narration or interview that helps tell the story.

Last Modified: icon icon Copy Link

FDU’s Acceptable Use Policy prohibits running software that accepts incoming connections from other computers.

Last Modified: icon icon Copy Link

Budget Transfers and Invoicing

Once a project is completed, an invoice will be generated that accurately reflects the predetermined cost associated with the production

Last Modified: icon icon Copy Link

Two-factor Authentication Two-factor authentication also referred to as multi-factor authentication, provides an additional layer of security when logging in to a website. Two-factor authentication is becoming the standard in cybersecurity. Google, Apple, and other services all have their two-factor authentication methods. In short, passwords are no longer sufficient in protecting our sensitive data; we’ve got…

Last Modified: icon icon Copy Link