Service: Students

Accept a New Certificate for FDU-Secure Wireless Network

Resources for:

FDU-Secure uses current encryption standards to connect to the FDU wireless network via secure wireless traffic.

Last Modified: Copy Link

Acceptable Use Policy for Computer Usage

Resources for:

Original Effective Date: 02/17/2013Revised Date: 04/20/2023 The computing and electronic communications facilities at Fairleigh Dickinson University support the instructional, research, and administrative activities of the University. Users of these facilities may have access to University resources, sensitive data, and external networks. Consequently, it is imperative for all users to behave in a responsible, ethical, and…

Last Modified: Copy Link

Accessing an FDU Email Account on a Mobile Device Using the Outlook App

Resources for:

The easiest way to access your FDU email account on your mobile device is to install the Outlook app from either the App Store (Apple) or the Play Store (Android)

Last Modified: Copy Link

ADA Compliance Services

Resources for:

All video projects produced by Multimedia Services must be closed captioned and transcribed.

Last Modified: Copy Link

Adding a FDU Email Account to a Mobile Device’s Native ‘Mail’ App

Resources for:

Audio Conferencing

Resources for:

Verizon Audio Conferencing service allows you to hold a meeting by phone at any time.

Last Modified: Copy Link

B-Roll Acquisition

Resources for:

B-Roll is supplemental footage inserted as a cutaway under narration or interview that helps tell the story.

Last Modified: Copy Link

Blocking Peer to Peer Applications

Resources for:

FDU’s Acceptable Use Policy prohibits running software that accepts incoming connections from other computers.

Last Modified: Copy Link

Budget Transfers and Invoicing

Resources for:

Once a project is completed, an invoice will be generated that accurately reflects the predetermined cost associated with the production

Last Modified: Copy Link

Cisco Duo FAQ’s

Resources for:

Two-factor Authentication Two-factor authentication also referred to as multi-factor authentication, provides an additional layer of security when logging in to a website. Two-factor authentication is becoming the standard in cybersecurity. Google, Apple, and other services all have their two-factor authentication methods. In short, passwords are no longer sufficient in protecting our sensitive data; we’ve got…

Last Modified: Copy Link