University Services
Agenda
Technology SupportData Privacy and SecuritySoftware and Hardware
Discounts for U of M Staff
Technology Support
Where to get technology support….before this happens
Or this happens…
U of M IT Structure
If you are unsure who to contact with a question, begin with your departmental IT personnel.
How can I get support on my departmental systems?
Department Help Line #
Auxiliary Services Departments (not including Housing & Dining Services)
4-1442
Facilities Management, Capital Planning, U Services, Environmental Health & Safety, Public Safety
5-1830
Dining Services 4-8357
Housing & Residential Life 5-8001
Call U of M 1-HELP for questions on central systems 612-301-4357
What systems does the central U of M support (OIT)?
There are a number of applications that you may use in your job that are not supported by your departmental IS area, but are supported by the central University (OIT).
Internet AccountsEnterprise Applications (e.g., PeopleSoft,
Google Apps)TelecommunicationsNetworking and wireless
How can I get support on central U of M systems (OIT)?
Internet Accounts
As an employee of the University of Minnesota you are provided with an internet account (sometimes referred to as your x.500). This is the key to accessing many U of M systems, including Google Mail & Calendaring as well as accessing personnel information such as your paycheck.
How can I get support on central U of M systems (OIT)?
Internet Accounts
Internet level passwords expire one year from the date they are set.
You will be notified when you need to change your password.
How can I get support on central U of M systems (OIT)?
Google Mail & CalendarThe U of M is the first Research 1 University to migrate to Google, and one of the first anywhere to offer the entire suite of apps to faculty and staff, as well as students. We are being looked upon as a leading-edge enterprise trendsetter, and many other universities are looking to us as an example and a success story.
Access Gmail & GCal at www.gmail.umn.eduLearning resources are available to everyone at: http://uttc.umn.edu/training/courses/googleapps
How do I schedule a U Services conference room in Google
Calendar?You can only schedule a meeting in a
conference room resource if you have been allowed access to it.
Please cancel a conference room reservation if you your meeting is cancelled or rescheduled.
How can I get Voicemail Training?
Gopher messaging is a unified messaging system that allows you to access your voice mail over the telephone and online and send messages to an email address. Refer to http://www1.umn.edu/nts/go4msg/ for training information and documentation.
How can I get Desktop Application Training?
Desktop Application
Refer to http://uttc.umn.edu/training/ for training information.
OIT Knowledge BaseFor answers to many frequently asked questions on IT products and services, go to:
http://www.adcs.umn.edu/kb/public
Wireless Facts OIT’s wireless network is one of the largest implementations of
802.11n technology anywhere in the world. There are over 4,300 wireless access points deployed on the
system. Radio frequency (RF) around campus is random due to the
University's size and initial wireless deployments. Physical impediments such as thick walls, metal structures and trees all interfere with RF propagation. In some cases it may be more feasible to use wired etherjack service instead of wireless.
View the wireless coverage map to see where wireless is available on campus.
You must use your University Internet ID and password to use the University's wireless service.
Data Privacy & Security
Why is Data Privacy and Security So Important?
A message from the President:
The information we gather, use, and share at the University, whether for research, outreach, clinical care, or education, is a valuable University asset. Because this information is so important to those we serve and so vital to our work, it is imperative that we maintain the highest standards to secure the confidentiality and integrity of private information, and the availability and integrity of public data. Learning and incorporating good data management practices in the work we do every day ensures the value of the information we use, and it keeps the trust we have earned in the communities we serve. Learning to manage data appropriately and securely is part of our shared responsibility. Robert H. Bruininks11/8/2002 - 6/30/2011
What data is public and what data is private?
The University collects and maintains a variety of information, including information about its students, faculty, staff and others. This information is collected in order to conduct U of M business.
Information is classified as public or private based on federal and state law.
For a compiled list of public and private data see: http://www.ahc.umn.edu/privacy/what/home.html
Private Data Private data (e.g., SSN, birth date, credit
card #’s) can only be released to the subject (i.e., owner) of the information and to those within the university who have a legitimate need-to-know, outside entities with the subject’s written permission and others as allowed by law.
Public dataPublic information is available to
anyone who requests it, except in the case of student data, when the student has requested that no public information about him/her can be released without express written permission.
Protecting Private Data Retrieve print-outs and faxes
that contain private data immediately. If you are faxing private data – follow-up with a phone call to be sure that the fax was received.
Always dispose of documents containing private information by shredding or placing in secure, confidential recycling containers.
Protecting Private Data Log off completely at
the end of the day. Turn off computers that
are unused for extended periods of time.
Lock your office or work area when you leave for extended periods of time.
Protecting Private Data
Your passwords are the key to your computer and your data.
Have a strategy for creating a password, remembering and changing it.
Do not share your password with anyone under any circumstances.
Keep your passwords secure
Protecting Private Data
Keep passwords in a locked location, not taped to your computer!
Refer to OIT Systems Security Guidelines for help in choosing a password:
http://www.oit.umn.edu/security/
Keep your passwords secure
Protecting Private Data
DO NOT store private university data on a laptop computer or other portable device such as a Personal Digital Assistant (PDA) or a flash drive. These are very susceptible to loss and theft. Staff should assume that these devices can be lost or stolen.
Protecting Private Data
If you have a U of M owned laptop, you must take responsibility to keep it physically secured. Laptops should NEVER be left unsecured in your office. A laptop security lock is another way to further detect theft.
If a laptop is stolen, notify your manager and your area IT Help Desk. They will file a police report and notify OIT Security. This is in accordance with the reporting procedures that are defined in the USIS Security of Sensitive Data policy.
Keep your laptop secure
What if I don’t use a computer in my job?
Turn in and report any laptops, flash drives or PDA’s that you find to your Supervisor.
Lock and secure all rooms after cleaning Report ANY suspicious activity to the U of M
police.
Some U Services workers don’t regularly interact with data in their job (e.g., FM Building and Grounds Worker, Dining Services Food Service Worker). There are things you can do as the eyes and ears” of the University to keep private data secure.
Public Jobs: Private Data Training
The Public Jobs: Private Data training program has been developed to help workforce members and volunteers on all campuses of the University of Minnesota learn about securing University data.
Public Jobs: Private Data Training
The training consists of three primary courses that focus on best practices for securing data in your job.
1. Data Security in Your Job - You will learn about actions to develop a secure work environment.
2. Securing Your Computer Workstation - You will learn about actions that increase risk to your computer and how to create and use strong passwords.
3. Using University Data - You will learn about practical techniques to reduce risks associated with using and sharing data.
How do I stay secure using e-mail? Do not use a non-University provided email
account to send University-related information as they are not appropriate or secure. Only xxx.umn.edu addresses are supported by OIT and centrally administered email servers.
How do I stay secure using e-mail?
Never open an email attachment from an unknown source. Attachments should only be opened from known contacts.
How do I stay secure using email?
Don’t use the links in an email to get to any web page if you suspect the message might not be authentic. Call the company or log onto the web site directly by typing the address into your browser.
Is this email legitimate?
How do I stay secure using email?
EMAIL SCAM:-------- Original Message -------- Subject: Important: Email Account Verification Update!! !? Date: Tue, 12 May 2009 09:22:32 -0400 From: Web Help Desk <[email protected]> Reply-To: [email protected] To: undisclosed-recipients:;
Your mailbox quota has been exceeded the storage limit which is 20GB as set by your administrator,You are currently running on 20.9GB. You may not be able to send or receive new mails until you re-validate your mailbox. To re-activate your account please click the link below mailsupportdirect.org/verify/secure/mailhelp/update/ Thanks and we are sorry for the inconviniences Localhost
The University of Minnesota will NEVER ask for your password in an email. Please do not respond to these emails and delete them immediately. Thank you.
How do I stay secure using e-mail?
Beware of Spear Fishing Scams:
In a spear fishing scam, the message can seem genuine because it appears to come from a legitimate source, such as the University of Minnesota. In recent months, there have been increasing numbers of customized attacks against the U of M, and some of them have been quite effective at tricking students, faculty, and staff into divulging personal information.
How do I stay secure using email?
Buying big-ticket items such as computers from U web sites and charging them to you;
Gaining access to your banking information or redirecting your paycheck to another bank account;
Sending malicious emails from you that can land you in serious legal troubles;
Selling information to other crooks.
Most phishing attacks at the U of M attempt to get internet ID’s and passwords rather than money. With this information, someone can get attack you by:
How do I stay secure using email?
• It asks for your internet password or SSN.• It contains upsetting or exciting statements that
express urgency.• It is poorly written and is not addressed to you
personally.
You should immediately be suspicious of an email if it does the following:
Contact your tech department and the 1-Help Technology Helpline if you think you are a victim of a phishing scam.
Protect your home computer
If you use your home computer to access U of M systems, it is important to keep your computer secure and to regularly patch and update your software as needed.
U of M Safe Computing Web Site
Security NewsInstructions on how to secure a
personal machineInstructions for what to do if your
computer is infected with a virusFREE Symantec AntiVirus for home use
for all staff and students
http:www.safecomputing.umn.edu
Examples of what can be accessed from home:
Remote access to Email & CalendarU of M Web SitesVoice MailDepartmental systems (use secure
VPN client if remote departmental system access is necessary)
U of M Security Policies OIT Security has a number of important security
policies that may affect you. All employees must comply with the Acceptable Use of Information Resources policy. These polices are located at:http://www.policy.umn.edu/Policies/it/index.htm
Your department may also have their own
security policies that are aligned with these OIT Security policies. Contact your departments technical personnel if you have any questions on any of these policies.
Software and hardware purchases for U of M staff
U of M faculty and staff are eligible to purchase computer software are reduced prices:Software:Faculty and staff who use Microsoft Office programs and the Windows operating system on their University-owned computers can use a second copy of a limited selection of products on either a laptop or desktop computer that he or she personally owns or leases. http://www.oit.umn.edu/utools/index.htmHardware:http://www.umart.umn.edu/
Mobile Technology Statistics• The average teenager sends more than 3,000 text
messages each month. • Office of Information Technology (OIT) websites are
accessed nearly 4,000 times a month by people using mobile devices. In October alone, OIT websites were accessed 3,444 times by people using mobile devices. Website visits with mobile devices has doubled over the last year. The most popular devices used to access OIT websites are Androids, iPads, and iPhones. They each account for over a 1,000 visits a month.
• According to EDUCAUSE Center for applied research, the percentage of college students who use mobile devices daily was up to 43% in 2010. We anticipate that this percentage will only continue to grow.
Summary Questions1. Your internet account is the key to many U of M
systems. True False
2. If I don’t use a computer daily in my work, I don’t need to worry about keeping private data secure.
True False
3. The U of M offers many technology training options: True False
Summary Questions4. There is only one technical support line number for
the entire U of M. True False
5. It is OK to store private data on a laptop as long as I lock it up when I am not using it.
True False
6. Any attachment that comes from a well known website is OK to open..
True False