Transcript U Services Information Technology Overview
University Services
Agenda
Technology Support Data Privacy and Security Software and Hardware Discounts for U of M Staff
Technology Support
Where to get technology support….before this happens
Or this happens…
If you are unsure who to contact with a question, begin with your departmental IT personnel.
U of M IT Structure
How can I get support on my departmental systems?
Department Auxiliary Services Departments (not including Housing & Dining Services) Facilities Management, Capital Planning, U Services, Environmental Health & Safety, Public Safety Dining Services Help Line # 4-1442 5-1830 4-8357 Housing & Residential Life 5-8001
Call U of M 1-HELP for questions on central systems 612-301-4357
What systems does the central U of M support (OIT)?
There are a number of applications that you may use in your job that are
not
supported by your departmental IS area, but are supported by the central University (OIT). Internet Accounts Enterprise Applications (e.g., PeopleSoft, Google Apps) Telecommunications Networking and wireless
How can I get support on central U of M systems (OIT)?
Internet Accounts
As an employee of the University of Minnesota you are provided with an internet account (sometimes referred to as your x.500).
This is the key to accessing many U of M systems, including Google Mail & Calendaring as well as accessing personnel information such as your paycheck.
How can I get support on central U of M systems (OIT)?
Internet Accounts
Internet level passwords expire one year from the date they are set.
You will be notified when you need to change your password.
How can I get support on central U of M systems (OIT)?
Google Mail & Calendar
The U of M is the first Research 1 University to migrate to Google, and one of the first anywhere to offer the entire suite of apps to faculty and staff, as well as students. We are being looked upon as a leading-edge enterprise trendsetter, and many other universities are looking to us as an example and a success story.
Access Gmail & GCal at www.gmail.umn.edu
Learning resources are available to everyone at: http://uttc.umn.edu/training/courses/googleapps
How do I schedule a U Services conference room in Google Calendar?
You can only schedule a meeting in a conference room resource if you have been allowed access to it. Please cancel a conference room reservation if you your meeting is cancelled or rescheduled.
How can I get Voicemail Training?
Gopher messaging is a unified messaging system that allows you to access your voice mail over the telephone and online and send messages to an email address. Refer to http://www1.umn.edu/nts/go4msg/ information and documentation.
for training
How can I get Desktop Application Training?
Desktop Application
Refer to http://uttc.umn.edu/training/ for training information.
OIT Knowledge Base
For answers to many frequently asked questions on IT products and services, go to: http://www.adcs.umn.edu/kb/public
Wireless Facts
OIT’s wireless network is one of the largest implementations of 802.11n technology anywhere in the world.
There are over 4,300 wireless access points deployed on the system. Radio frequency (RF) around campus is random due to the University's size and initial wireless deployments. Physical impediments such as thick walls, metal structures and trees all interfere with RF propagation. In some cases it may be more feasible to use wired etherjack service instead of wireless.
View the wireless coverage map available on campus. to see where wireless is You must use your University Internet ID and password to use the University's wireless service.
Data Privacy & Security
Why is Data Privacy and Security So Important?
A message from the President:
The information we gather, use, and share at the University, whether for research, outreach, clinical care, or education, is a valuable University asset. Because this information is so important to those we serve and so vital to our work, it is imperative that we maintain the highest standards to secure the confidentiality and integrity of private information, and the availability and integrity of public data. Learning and incorporating good data management practices in the work we do every day ensures the value of the information we use, and it keeps the trust we have earned in the communities we serve. Learning to manage data appropriately and securely is part of our shared responsibility.
Robert H. Bruininks
11/8/2002 - 6/30/2011
What data is public and what data is private?
The University collects and maintains a variety of information, including information about its students, faculty, staff and others. This information is collected in order to conduct U of M business. Information is classified as
public
or
private
based on federal and state law.
For a compiled list of public and private data see: http://www.ahc.umn.edu/privacy/what/home.html
Private Data
Private
data (e.g., SSN, birth date, credit card #’s) can only be released to the subject (i.e., owner) of the information and to those within the university who have a legitimate need-to-know, outside entities with the subject’s written permission and others as allowed by law.
Public data
Public
information is available to anyone who requests it, except in the case of student data, when the student has requested that no public information about him/her can be released without express written permission.
Protecting Private Data
Retrieve print-outs and faxes that contain private data immediately. If you are faxing private data – follow-up with a phone call to be sure that the fax was received.
Always dispose of documents containing private information by shredding or placing in secure, confidential recycling containers.
Protecting Private Data
Log off completely at the end of the day.
Turn off computers that are unused for extended periods of time.
Lock your office or work area when you leave for extended periods of time.
Protecting Private Data
Keep your passwords secure
Your passwords are the key to your computer and your data.
Have a strategy for creating a password, remembering and changing it.
Do not share your password with anyone under any circumstances.
Protecting Private Data
Keep your passwords secure
Keep passwords in a locked location, not taped to your computer!
Refer to OIT Systems Security Guidelines for help in choosing a password: http://www.oit.umn.edu/security/
Protecting Private Data
DO NOT store private university data on a laptop computer or other portable device such as a Personal Digital Assistant (PDA) or a flash drive. These are very susceptible to loss and theft.
Staff should assume that these devices can be lost or stolen
.
Protecting Private Data
Keep your laptop secure
If you have a U of M owned laptop, you must take responsibility to keep it physically secured. Laptops should NEVER be left unsecured in your office. A laptop security lock is another way to further detect theft.
If a laptop is stolen, notify your manager and your area IT Help Desk. They will file a police report and notify OIT Security. This is in accordance with the reporting procedures that are defined in the
USIS Security of Sensitive Data
policy.
What if I don’t use a computer in my job?
Some U Services workers don’t regularly interact with data in their job (e.g., FM Building and Grounds Worker, Dining Services Food Service Worker). There are things you can do as the eyes and ears” of the University to keep private data secure.
Turn in and report any laptops, flash drives or PDA’s that you find to your Supervisor.
Lock and secure all rooms after cleaning Report ANY suspicious activity to the U of M police.
Public Jobs: Private Data Training
The
Public Jobs: Private Data
training program has been developed to help workforce members and volunteers on all campuses of the University of Minnesota learn about securing University data.
Public Jobs: Private Data Training
The training consists of three primary courses that focus on best practices for securing data in your job.
1.
2.
3.
Data Security in Your Job
- You will learn about actions to develop a secure work environment.
Securing Your Computer Workstation
- You will learn about actions that increase risk to your computer and how to create and use strong passwords.
Using University Data
- You will learn about practical techniques to reduce risks associated with using and sharing data.
How do I stay secure using e-mail?
Do not use a non-University provided email account to send University-related information as they are not appropriate or secure. Only
xxx.umn.edu
addresses are supported by OIT and centrally administered email servers.
How do I stay secure using e-mail?
Never
open an email attachment from an unknown source. Attachments should only be opened from known contacts.
How do I stay secure using email?
Don’t use the links in an email to get to any web page if you suspect the message might not be authentic. Call the company or log onto the web site directly by typing the address into your browser.
Is this email legitimate?
How do I stay secure using email?
EMAIL SCAM:
-------- Original Message -------- Subject: Important: Email Account Verification Update!! !? Date: Tue, 12 May 2009 09:22:32 -0400 From: Web Help Desk
To: undisclosed-recipients:; Your mailbox quota has been exceeded the storage limit which is 20GB as set by your administrator,You are currently running on 20.9GB. You may not be able to send or receive new mails until you re-validate your mailbox. To re-activate your account please click the link below
mailsupportdirect.org/verify/secure/mailhelp/update/
Thanks and we are sorry for the inconviniences Localhost The University of Minnesota will
NEVER
ask for your password in an email. Please do not respond to these emails and delete them immediately. Thank you.
How do I stay secure using e-mail?
Beware of Spear Fishing Scams:
In a spear fishing scam, the message can seem genuine because it appears to come from a legitimate source, such as the University of Minnesota. In recent months, there have been increasing numbers of customized attacks against the U of M, and some of them have been quite effective at tricking students, faculty, and staff into divulging personal information.
How do I stay secure using email?
Most phishing attacks at the U of M attempt to get internet ID’s and passwords rather than money. With this information, someone can get attack you by: Buying big-ticket items such as computers from U web sites and charging them to you; Gaining access to your banking information or redirecting your paycheck to another bank account; Sending malicious emails from you that can land you in serious legal troubles; Selling information to other crooks.
How do I stay secure using email?
You should immediately be suspicious of an email if it does the following: • • It asks for your internet password or SSN.
It contains upsetting or exciting statements that express urgency.
• It is poorly written and is not addressed to you personally.
Contact your tech department and the 1-Help Technology Helpline if you think you are a victim of a phishing scam.
Protect your home computer
If you use your home computer to access U of M systems, it is important to keep your computer secure and to regularly patch and update your software as needed.
U of M Safe Computing Web Site
http:www.safecomputing.umn.edu
Security News Instructions on how to secure a personal machine Instructions for what to do if your computer is infected with a virus FREE Symantec AntiVirus for home use for all staff and students
Examples of what can be accessed from home:
Remote access to Email & Calendar U of M Web Sites Voice Mail Departmental systems (use secure VPN client if remote departmental system access is necessary)
U of M Security Policies
OIT Security has a number of important security policies that may affect you. All employees must comply with the
Acceptable Use of Information Resources policy.
These polices are located at: http://www.policy.umn.edu/Policies/it/index.htm
Your department may also have their own security policies that are aligned with these OIT Security policies. Contact your departments technical personnel if you have any questions on any of these policies.
Software and hardware purchases for U of M staff
U of M faculty and staff are eligible to purchase computer software are reduced prices:
Software:
Faculty and staff who use Microsoft Office programs and the Windows operating system on their University owned computers can use a second copy of a limited selection of products on either a laptop or desktop computer that he or she personally owns or leases. http://www.oit.umn.edu/utools/index.htm
Hardware
:
http://www.umart.umn.edu/
• • •
Mobile Technology Statistics
The average teenager sends more than 3,000 text messages each month. Office of Information Technology (OIT) websites are accessed nearly 4,000 times a month by people using mobile devices. In October alone, OIT websites were accessed 3,444 times by people using mobile devices. Website visits with mobile devices has doubled over the last year. The most popular devices used to access OIT websites are Androids, iPads, and iPhones. They each account for over a 1,000 visits a month. According to EDUCAUSE Center for applied research, the percentage of college students who use mobile devices daily was up to 43% in 2010. We anticipate that this percentage will only continue to grow.
1.
Summary Questions
Your internet account is the key to many U of M systems.
True
False
2.
If I don’t use a computer daily in my work, I don’t need to worry about keeping private data secure.
True
False
3.
The U of M offers many technology training options:
True
False
Summary Questions
4.
There is only one technical support line number for the entire U of M.
True
False
5.
It is OK to store private data on a laptop as long as I lock it up when I am not using it.
True
False
6.
Any attachment that comes from a well known website is OK to open..
True
False