FDU-Secure uses current encryption standards to connect to the FDU wireless network via secure wireless traffic.
Service: Students
Accept a New Certificate for FDU-Secure Wireless Network
Acceptable Use Policy for Computer Usage
Original Effective Date: 02/17/2013Revised Date: 12/20/2021 The computing and electronic communications facilities at Fairleigh Dickinson University support the instructional, research, and administrative activities of the University. Users of these facilities may have access to University resources, sensitive data, and external networks. Consequently, it is imperative for all users to behave in a responsible, ethical, and…
Need help?
Accessing an FDU Email Account on a Mobile Device Using the Outlook App
The easiest way to access your FDU email account on your mobile device is to install the Outlook app from either the App Store (Apple) or the Play Store (Android)
Need help?
ADA Compliance Services
All video projects produced by Multimedia Services must be closed captioned and transcribed.
Need help?
Adding a FDU Email Account to a Mobile Device’s Native ‘Mail’ App
Audio Conferencing
Verizon Audio Conferencing service allows you to hold a meeting by phone at any time.
Need help?
B-Roll Acquisition
B-Roll is supplemental footage inserted as a cutaway under narration or interview that helps tell the story.
Need help?
Blocking Peer to Peer Applications
FDU’s Acceptable Use Policy prohibits running software that accepts incoming connections from other computers.
Need help?
Budget Transfers and Invoicing
Once a project is completed, an invoice will be generated that accurately reflects the predetermined cost associated with the production
Need help?
Cisco Duo FAQ’s
Two-factor Authentication Two-factor authentication also referred to as multi-factor authentication, provides an additional layer of security when logging in to a website. Two-factor authentication is becoming the standard in cybersecurity. Google, Apple, and other services all have their two-factor authentication methods. In short, passwords are no longer sufficient in protecting our sensitive data; we’ve got…