Resources

Explore our comprehensive IT resource library to discover a wealth of helpful information tailored to your needs. Utilize our filters to refine your search by role at FDU, department, or specific service for a more personalized experience.

Support
Resources Header

Operating System Support Lifecycle

Resources for:
icon Close

Fairleigh Dickinson University’s Acceptable Use Policy for Computer Usage states, “All computers and mobile devices accessing any FDU resource must run an operating system and configuration that is supported by its vendor with regard to security patches and updates.”

This guide defines the lifecycle of our support for different operating systems.

Note

Apple does not publish official End of Life dates, but typically provides security updates for the current release of macOS, as well as the previous two releases.

Support Status Descriptions

Active (Default) This platform is supported by FDU Computer Services & University Systems and Networking and new machines will be built with this platform unless otherwise requested.
Active This platform is supported by FDU Computer Services & University Systems and Networking and will be installed on request.
Containment This platform is currently supported by FDU Computer Services & University Systems and Networking but no new machines will be built with this platform. Platforms in containment will receive security updates and patches for the FDU supported software components. FDU Computer Services & University Systems and Networking Facilities will not provide new software or major revisions to existing software for these platforms.
Phasing Out FDU Computer Services & University Systems and Networking is actively working to migrate assets away from this platform. Platforms go in to this status automatically 6 months before the FDU End of Support Date. Platforms may be placed in this status before that time.
EOL This platform is no longer supported by FDU Computer Services & University Systems and Networking. Software support will be dropped from any asset running this platform. Other levels of support may be dropped as circumstances warrant. A valid reason is required to maintain an asset running this platform past the End of FDU Support date. All exceptions must be logged and periodically reviewed.

Supported Operating Systems

Desktop

OS Family Operating System Latest Release FDU Support Status Vendor Release Date Start of FDU Support End of FDU Support Latest Vendor EOL Date
macOS Tahoe 26 Active (Default) Sep-2025 Nov-2025 Jun-2028 ~2028
Sequoia 15 Active (Default) Sep-2024 Nov-2024 Jun-2027 ~2027
Sonoma 14 Phasing Out Sep-2023 Nov-2023 Jun-2026 ~2026
Windows Windows 11 25H2 Active (Default) Sep-2025 Nov-2025 Sep-2028 Oct-2028
24H2 Phasing Out Oct-2024 Jun-2025 Sep-2027 Oct-2027
23H2 Phasing Out Oct-2023 Jul-2024 Oct-2026 Nov-2026
Windows 10 22H2 EOL Oct-2022 Dec-2022 Oct-2025 Oct-2025

Mobile

OS Family Operating System Latest Release FDU Support Status Vendor Release Date Start of FDU Support End of FDU Support Latest Vendor EOL Date
Apple iOS 26 Active (Default) Sep-2025 Nov-2025 Oct-2028 ~2028
18 Phasing Out Sep-2024 Nov-2024 Oct-2027 ~2027
17 Containment Sep-2023 Nov-2023 Oct-2026 ~2026
Android Baklava 16 Active (Default) Jun-2025 Dec-2025 ~2028 ~2028
Vanilla Ice Cream 15 Active Sep-2024 Dec-2024 ~2027 ~2027
Upside Down Cake 14 Active Oct-2023 Dec-2023 ~2027 ~2027
Tiramisu 13 Phasing Out Aug-2022 Oct-2022 ~2026 ~2026
Snow Cone V2 12.1 Phasing Out Mar-2022 Jul-2022 ~2026 ~2026

Latest Release

The latest release for desktop operating systems includes all minor and incremental updates.

End of Life

Any operating system not listed above is considered EOL (End of Life) and will not be supported. Examples of EOL Operating Systems include:

Windows: 95,98, XP, ME, VISTA, 7, 8, 8.1, & 10
macOS: Yosemite, El Capitan, Sierra, High Sierra, Mojave, Catalina, Big Sur, Monterey, & Ventura

Last Modified:

Ordering FDU-Owned Laptop Accessories

Resources for:
icon Close

The following PC laptop accessories for university-owned Apple MacBook Pro and Dell laptops may be purchased from our approved vendors. Please use the following PC laptop accessories list and vendor contact information below to help guide you when obtaining optional laptop accessories.

Dell Pro 14 Plus PC Laptop Accessories

A/C Adapters

Only one A/C adapter will be provided with the new Dell laptops. If a user needs a second A/C adaptor, they will need to order the part below.

AccessoryDescriptionManufacturer Part NumberCDW Part NumberCost
Dell 65W USB-C AdapterDell AC Power adaptor (USB-C)492-BDQM7796926$34.00

*Prices are noted as of July 2025

close
Docking Stations
AccessoryDescriptionManufacturer Part NumberCDW Part NumberInputsCost
Multi-Monitor Docking StationDell Pro Smart Dock SD25 – docking station – USB-C – HDMI, 2 x DP, USB-C – 1GbE, 2.5GbEDELL-SD2583621051 HDMI
2 DisplayPort
1 USB-C
$250.00
Multi-Monitor Docking StationDell Pro Thunderbolt 4 Smart Dock SD25TB4 – docking station – Thunderbolt 4 – HDMI, 2 x DP, 2 x Thunderbolt 4, USB-CDELL-SD25TB483621081 HDMI
2 DisplayPort
2 Thunderbolt 4
1 USB-C
$355.00

*Prices are noted as of July 2025

close
Keyboards

Keyboards will not need to be replaced for users that already have them. Users that are new to the PC laptop docking station setup may want to buy a wired USB keyboard. There are no IT requirements for purchasing keyboards; however, if users want to go with a basic model, they can order the below part number.

AccessoryDescriptionManufacturer Part NumberCDW Part NumberCost
Wired USB KeyboardDell KB216 – keyboardKB216-BK-US4306011$22.93

*Prices are noted as of July 2025

close
Mice

There are no IT requirements for purchasing external wired USB mice; however, if a user wants to go with a basic model, they can order the below part number.

AccessoryDescriptionManufacturer Part NumberCDW Part NumberCost
Wired USB MouseDell Optical Wired Mouse – MS116MS116-BK3938481$22.93

*Prices are noted as of July 2025

close
Monitors

For users who already have a monitor and wish to use it with one of the new docking stations, your existing monitor must have either an HDMI or DisplayPort (DP) input connection. If your monitor only has a DisplayPort (DP) connection, you will need an HDMI to DisplayPort (DP) adapter. Users should check their current monitor connections for compatibility; if new monitors are required or desired, please choose from the list below.

AccessoryDescriptionManufacturer Part NumberCDW Part NumberInputsFeaturesCost
24″ External MonitorDell P2425H 24-inch Full HD LED MonitorDELL-P2425H78787971 HDMI
1 DisplayPort
1 VGA
Built-in Camera:
No

Built-in USB Hub: Yes
$182.00
27″ External MonitorDell P2725H – LED monitor – Full HD (1080p) – 27″DELL-P2725H78788011 HDMI
1 DisplayPort
1 VGA
Built-in Camera:
No

Built-in USB Hub:
Yes
$234.99
34″ External MonitorDell Pro 34 Plus USB-C Hub Monitor P3425WE – LED monitor – curved – 34.1″DELL-P2725H82976431 HDMI
1 DisplayPort
1 VGA
Built-in Camera:
No

Built-in USB Hub: Yes
$715.99

*Prices are noted as of July 2025

close
Network Accessories
AccessoryDescriptionManufacturer Part NumberCDW Part NumberCost
Ethernet Network AdapterDell SA224 – network adapter – USB-C – 10M/100M/1G/2.5 Gigabit Ethernet x 1DELL-SA224-BK7891267$29.99

*Prices are noted as of July 2025

close
Wireless Keyboard and Mouse Combo

There are no IT requirements for purchasing an external wireless keyboard and mouse combo set; however, if a user would like to go with a basic model, they can order the below part number.

AccessoryDescriptionManufacturer Part NumberCDW Part NumberCost
Wireless Keyboard & Wireless MouseLogitech MK850 Performance Keyboard and Mouse (wireless)920-0082194540578$67.07 from CDW-G

*Prices are noted as of July 2025

close

Lenovo Desktop PC Accessories

Keyboards

Keyboards will not need to be replaced for users that already have them. Users that are new to the PC laptop docking station setup may want to buy a wired USB keyboard. There are no IT requirements for purchasing keyboards; however, if users want to go with a basic model, they can order the below part number.

AccessoryDescriptionPart NumberCost
Wired USB KeyboardLenovo Preferred Pro II USB Keyboard – US English4X30M86879$26.17 from CDW-G
close
Mice

There are no IT requirements for purchasing external wired USB mice; however, if a user wants to go with a basic model, they can order the below part number.

AccessoryDescriptionPart NumberCost
USB MouseLenovo Essential USB Mouse4Y50R20863$18.80 from CDW-G
close
Monitors
AccessoryDescriptionPart NumberInputsFeaturesCost
24″ External MonitorLenovo ThinkVision T24v-30 – LED monitor – Full HD (1080p) – 23.8″63D8MAR3USHDMI, DisplayPort, VGABuilt-in Camera: Yes

Built-in USB Hub: Yes
$324.38 from CDW-G. This monitor is the preferred 24″ model to purchase if the the user requires a built-in web camera.
27″ External MonitorLenovo ThinkVision T27hv-30 – LED monitor – QHD – 27″63D6UAR3USHDMI, DisplayPort,
USB-C
Built-in Camera: Yes

Built-in USB Hub: Yes
$628.58 from CDW-G. This monitor is the preferred 27″ model to purchase if the the user requires a built-in web camera.
close
Wireless Keyboard and Mouse Combo

There are no IT requirements for purchasing an external wireless keyboard and mouse combo set; however, if a user would like to go with a basic model, they can order the below part number.

AccessoryDescriptionPart NumberCost
Wireless KeyboardLogitech MK850 Performance Keyboard and Mouse (wireless)920-008219$67.07 from CDW-G
close

Apple MacBook Pro Laptop Accessories

A/C Power Adapters for 14-inch & 16-inch MacBook Pro
AccessoryDescriptionPart NumberCost

A/C Power Adapter
Apple USB-C – Power Adapter –
96 Watt
MX0J2AM/A$63.19 from CDW-G

A/C Power Adapter
Apple Power Cable –
24 pin USB-C to MagSafe 3 – 6.6 ft
MLYV3AM/A$41.65 from CDW-G
close
Docking Stations
AccessoryDescriptionPart NumberInputsCost
Single Monitor Docking Station or HubHyperDrive Ultimate USB-C Hub – This model supports a single external monitor setup. One HDMI port supports video resolutions up to 4K at 30 Hz. Featuring three USB 3.1 Gen 1 Type-A ports, 1 USB Type-C Power Delivery port, one ethernet port, and one 3.5mm audio jack, plus SD and microSD card readers.HD30FGRAY1 HDMI, 1 Mini DisplayPort, 1 VGA$89.99 from B&H.com. This model is the preferred single monitor hub to purchase
Dual-Monitor Docking Station or HubHYPER HyperDrive Viper 10-in-2 USB Type-C Hub (Space Gray) – This model is essential for connecting up to two external monitors. This hub provides two HDMI and three USB 3.1 Gen 1 Type-A ports, as well as ports for Gigabit Ethernet, 3.5mm audio, and USB Type-C with 60W of power delivery. UHS-1 SD and microSD card readers are also present.HD392-GRAY2 HDMI$129.99 from CDW-G.
$129.99 from B&H.com. This model is the preferred dual-monitor hub to purchase
Single Monitor Docking Station or HubHYPER Hyperdrive 4-In-1 USB Type-C Hub – This model supports a single external monitor setup. Supports a single 4K display at 60 Hz via the one HDMI port. Featuring two USB 3.2 Gen 1 Type-A ports and one USB Type-C port to deliver up to 100W of pass-through power to your laptop or tablet.HD411 HDMI$59.99 from B&H.com. This model does not contain an ethernet port
Single Monitor Docking Station or HubHyperDrive 5-Port USB Type-C Hub – This model supports a single external monitor setup. Supports a single 4K monitor at 60 Hz via the one HDMI port. Features two USB Type-A ports, one ethernet port, and one USB Type-C port to deliver up to 86W of power to your laptop or tablet.HDMB21 HDMI$84.59 from CDW-G
Single Monitor Travel Hub or Docking StationLenovo Powered USB-C Travel Hub – This model supports a single external monitor setup. Features one ethernet port, one USB Type-A port, one USB 3.1 Gen 1 Type-A port, and one USB-C power port.4X90S923811 HDMI, 1 VGA$82.28 from CDW-G
close
Monitors
AccessoryDescriptionPart NumberInputsFeaturesCost
24″ External MonitorASUS ProArt PA247CV – LED monitor – Full HD (1080p) – 23.8″PA247CVHDMI, DisplayPort,
USB-C
Built-in Camera: No
Built-in USB Hub: Yes
$201.69 from CDW-G

You may also refer to the Lenovo Desktop PC Accessories – Monitors section above to select an external monitor for the Apple MacBook Pro.

close

Accessories

USB Flash Drives

There are no IT requirements for purchasing USB flash drives. USB 3.0 is recommended. Users are reminded about adhering to the Written Information Security Program (WISP). No WISP-protected data may be placed on external devices without specific authorization, as indicated in the policy.

close
External Hard Drives

There are no IT requirements for purchasing external hard drives. USB 3.0 is recommended. Users are reminded about the Written Information Security Program (WISP). No WISP-protected data may be placed on external devices without specific authorization as indicated in the policy.

close
Printers / Scanners

For a current list of approved printers and scanners, please reach out to the Purchasing Department. Please remember that most printers don’t have USB printer cables included upon purchase.

Note

While most modern printers support wireless connectivity, wireless printing capabilities may not be enabled on any printer without the explicit authorization of the Director of Networking.

close

Purchasing

FDU Purchasing

To purchase any of the laptop accessories listed above, please submit a PO to the Purchasing Department. Users need to get a quote from either vendor through the contact information below. Please reference the item numbers from the attached quotes. Unless stated otherwise, the products listed are currently available. Prices may vary. Other University approved vendor reseller information and common products that departments may be interested in purchasing can be found by visiting:

FDU Purchasing

Departments should consolidate orders as much as possible. There is no additional discount for quantity. Departments should designate the ‘ship to’ to their respective department. Vendors’ contact information is listed below.

close
Sample Purchase Order (PO) Quotes

Tip

View the Sample PO quotes to help guide you when obtaining your own quote prior to submitting to the Purchasing Department.


CDW-G:

Vinny Nariyani
Email: vinnnar@cdwg.com

and

Joe Masulli
Email: joemasu@cdwg.com

SAMPLE CDW-G PO Quote Page 1
SAMPLE CDW-G PO Quote Page 2
close

Last Modified:

Papercut Printing User Instructions

Resources for:
icon Close

The instructions below pertain to any Vancouver user that will use the Secure Print, Scan to email, and Copy functions of the Xerox printers.

Account Balances

Vancouver users have the following account balances listed below:

  1. Free Quota, is a designated account balance that is applied to all the students and is auto-replenished on schedule – before the start of the semester. This is the first balance that gets deducted after which the secondary “Paid_Balance” goes into effect.
  2. Paid Balance is the amount credited onto a student’s account when they pay for extra printing credits.

Free Quota Account Balance Automated Replenishment

Each user listed below has a specified amount of Free Quota replenished according to a schedule:

  • Adjuncts: $1000.00 replenished at the start of the school year
  • Student IT Assistants And Student Workers: $200.00 replenished at the start of every school term
  • Staff and Faculty: $1000.00 replenished at the start of every school term
  • Students: $10.00 replenished at the start of every school term

Paid Balance Reload / Replenishment

The instructions below are for Students on how to reload/replenish their Paid Balances:

  1. Go to Enrollment Services to pay for the amount they wish to recharge
  2. Bring the receipt to IT Office to request the reload for their Paid Balance
Logging In
  1. Users can either swipe their badge or use their FDU NetID and password to log in. To use your credentials press the “Keyboard” button on the top right of the screen
Papercut Log in using credentials
  • If upon swiping your badge the following screen appears on the Xerox printer screen. Enter your credentials to associate them with your account. For a detailed walkthrough, play the video below:
close
Checking Account Balance on Printer

To check your total balance from the printer, log into that printer and press the “Access Device” button. The balance will be displayed on the screen.

close
Secure Print
  1. To release a print job after you have sent a print job to the appropriate printer and logged into that printer. Press the “Print Release” button
  • To print all jobs under the queue press the checkbox above all the jobs (2) then press the “Print” button (5)
  • To print a selection of the jobs, select the appropriate checkbox beside the jobs you want to print (3), then press the “Print” button (5)
  • To delete jobs from the printer’s queue, select the appropriate checkbox beside the jobs you want to delete (3), then press the “Trashcan” button (4)
  1. To log off of the printer, press the “Log Out” icon on the top right next to your name
close
Scan to Email
  1. To start a scan-to-email job, log into a printer and press the “Scan” button
  1. You can press the “Star“’ button (4) immediately to start scanning
    • Optionally you can edit the Subject and Filename entries (2) and the scan settings (3)
  1. To log off of the printer, press the “Log Out” icon on the top right next to your name
close
Copying
  1. To start a copy job, log into a printer and press the “Access Device” button
  1. Press “Access Device
  • To return to the PaperCut MF main screen, press the “PaperCut MF” button
  1. To copy, press the “Copy” button
  1. Enter the number of copies and then press the “Star“’ button for the default selection (Auto Detect Color, 1-1 Sided copies). Optionally you can change the settings shown in the yellow box below, then press the “Star” button
  • You can delete the job at any point in the previous screens by pressing the “Delete” button. If only N number of pages have been printed, you will only be charged N times
  1. To log off of the printer, press your username on the top left and then press the “Log Out” button.
  1. Press the “Log Out” button again
close

Accessing your Papercut Account

The user console can be accessed via vanpd-papercut.vancouver.fdu.edu.

  1. Log in using your FDU netID then select the “Login” button
  1. You can review your Transaction History, Balances, Recent Print Jobs & Jobs Pending Release by selecting the appropriate tab on the left-hand side. You can also see your environmental impact according to your print, scan & copy activities
Last Modified:

Passwords Guidelines

Resources for:
icon Close

Creating strong, secure passwords is essential to protecting your personal information and maintaining the safety of your FDU NetID account. This article provides clear guidelines for password creation, including complexity requirements, helpful tips, and best practices to ensure your account remains secure. By following these guidelines, you can create passwords that are not only compliant with university policies but also resilient against potential threats.

Guidelines for Passwords

  • Passwords must be between 8-16 characters
  • Pass a basic complexity check

Password Requirements:

  • At least one uppercase letter
  • At least one lowercase letter
  • At least one number
  • At least one special character

Passwords must not:

  • Contain your first or last name
  • Be the same as any prior passwords

Helpful Tips:

  • Longer passwords (or “passphrases”) can be created using a phrase or sentence. These are easy to remember but difficult for others to guess.
  • A short, meaningful phrase or sentence is often easier to recall.

Other Important Password-Related Guidelines:

  • Your account is your responsibility. Do not share your password with others, including technicians. FDU IT staff will never ask for your password.
  • Avoid choosing a password based on personal information that someone who knows you could guess.
  • Do not use your FDU NetID or your name/department name as your password.
  • Refrain from using your FDU NetID and password to access third-party systems (e.g., online shopping, newspapers, travel websites).
  • Avoid letting software save or store your passwords. This increases the risk of unauthorized access and makes it harder to remember your password if you don’t type it in regularly.
  • Always log out of programs or websites and close your browser (e.g., Internet Explorer, Firefox, Chrome) when done, especially on public computers.
  • Treat your passwords as valuable and protect them accordingly.
  • Passwords must be changed every 90 days.

To learn how to change your NETID password, follow the steps in this article:


For more details, refer to the University’s Password Policy:

Last Modified:

Perceptive Experience Handbook

Resources for:
icon Close

Logging into Perceptive

  1. To login, use your FDU NetID (Email credentials):
  1. After you login, you should have a screen that looks something like this:

Capture

  1. To capture a document to store in Perceptive, click on the Capture tab on the main Experience screen.
  1. Now the Capture screen will display.
  2. Now you will choose the appropriate Application Plan to Use
  3. Make sure that in the box on the top left under the Perceptive logo and Capture has the correct Capture Profile you will use to store the document.  In this example, the Ext Capture Profile Learning House Staff has been chosen.  When chosen, the Document Properties box will appear on the right side of the screen with the appropriate field labels.
  1. Now click on the Capture tab next to the Capture Profile that you picked.  A new dialog box will appear:
  1. Click on the Browse tab.  This will bring up File Explorer.  Choose the file you want to save to Perceptive. 
  1. When you click Open, it will bring you back to the Dialog Box.  There will be a pause and when the document has been selected, the message “1 file selected” will appear.  
  1. Click on the highlighted tab that says “Done”.
  2. The Capture screen re-appears and the selected document will appear in a box on the left.  The Document Properties box will re-appear on the right. 
  1. In the first field, choose the drawer in which you wish to store the document.  Now fill in the remaining fields with the appropriate information. 
  1. When done filling in the data, click on the Save tab at the top middle of the screen next to the Capture drop down.  
  2. Once you click Save, the document has been stored in Perceptive and you will see a “Success” message highlighted in green:
  1. The data that you entered will also disappear from the Document Properties box.  Now you are ready to capture your next document for Perceptive going through the same steps that you just went through.

Document Search

  1. To search for a document in Perceptive Experience, click on the Documents tab on the main Experience screen.
  1. Now the Documents Search screen will display.  On the left hand side, a column labeled “Document Views” will appear showing the drawers for which you will have access.  Please highlight and click on the appropriate drawer where you document resides.  

Also, two boxes will appear in the middle – a white box with the words “Search in the name of the highlighted drawer on the left”. The second blue box says Enter Search Criteria.

  • To enter search criteria, click inside the white box.  A new row of boxes will appear between the two original boxes.  These new boxes are the criteria and method you wish to conduct a search.  The first box is labeled “Add constraint”.  It is a dropdown box with a list of keys you may search on.  Name will always appear as the first entry.  Do not attempt to use that constraint.  It is not what you think it might be.   It is a parameter that we do not use.  Choose the constraint or key that you wish from the drop down – usually ID number or Last Name.  The second box is also a drop down box.  It is for the operation that will be performed – normally you would choose “starts with” or “equal to”.  The third box is where you would type in the actual value of the key you are looking for, usually the last name or ID number of the person you are searching for.  There is a wild card that you can use if you are unsure about the spelling of the key or the complete ID number.  The wildcard is the percent sign (%).  An example would be BRAN% or %ancon% or 01234%.  Also in the case of ID numbers, the leading zero is important to include.  If searching for ID# 0956712 using “equal to” you must make sure that the leading zero is included. 
  • Below is an example of a search where I want to find MIS COLLEAGUE Account Requests for anyone who has an ID number beginning with “14”.  I would click on the clear white box to get the three prompt boxes.  I would then put in the Constraint (Key), then the operand and finally the value of what I am searching for – ID number – starts with – 14.  I would then click on the Add button and that gets entered into the previously blank search box.  You may add another constraint (key) if you like or just click on the blue Search button at the very right.
  • Here is another example below where I am looking for anyone in this drawer that has the string ‘ranc’ in the last name. Notice the operand and the placement of the % signs in the value field.
Last Modified:

Policy for Acceptable Use of Email

Resources for:
icon Close

As a member of our community, your FDU NetID is your passport to accessing many of Fairleigh Dickinson University’s IT services. Most important is your student, employee, or alumni FDU Email account. When using FDU Email, you are an ambassador for our institution and we expect that you will conduct yourself in an efficient, effective, ethical, and lawful manner. Please review our Policy for Acceptable Use of Email to ensure that you are adhering to all security and decorum requirements.

Effective Date: 08/01/2024
Last Revision Date: 08/01/2018

1.0 Introduction

The purpose of this policy is to ensure the proper use of e-mail by all those assigned a Fairleigh Dickinson University (FDU) e-mail account. This policy applies to any e-mail system that FDU has or may install in the future. It also applies to employee use of personal e-mail accounts via browsers, as directed below. All users of FDU e-mail systems have the responsibility to use their e-mail in an efficient, effective, ethical and lawful manner. E-mail users must follow the same code of conduct expected in any other form of written or face-to-face business communication. FDU may supplement or modify this policy for specific employees in certain roles. This policy complements similar FDU policies such as the Acceptable Use Policy and the Written Information Security Program (WISP). Please read and follow those policies as well.

The University subscribes to the 1940 Statement of Principles on Academic Freedom and Tenure and the 1940 and 1970 Interpretive Comments issued thereon, formulated jointly by the Association of American Colleges and the American Association of University Professors. Nothing in this policy is intended to supersede those statements and principles.

2.0 Ownership of Email Data

The University owns all University email accounts in the fdu.edu domain, or any subsequent domains it may create (University Email Accounts). Subject to underlying copyright and other intellectual property rights under applicable laws and University policies, the University also owns data transmitted or stored using the University Email Accounts.

3.0 Employee Responsibilities

FDU only supports the installation and usage of approved e-mail clients.

Usernames will be assigned as part of the University’s e-mail registration process and reflect internally mandated e-mail naming conventions.

Email is the primary means of official communication for Fairleigh Dickinson University. All employees, full-time and part-time, are responsible to check their @FDU.edu email accounts regularly for communication from students, faculty, staff, and administrators.

Further, all FDU employees, including faculty, full-time and part-time, are required to use their @FDU.edu email account for all University-related correspondence except in such situations when Office365.fdu.edu is unavailable.

3.1 Acceptable Uses

  • Communicating in a professional manner with other FDU associates about work-related matters.
  • Communicating in a professional manner with parties outside FDU for business purposes.
  • Personal communications that are brief and do not interfere with work responsibilities.
  • Users are allowed to access personal e-mail accounts on a limited basis, without disrupting business responsibilities. Access can be gained only by using a browser. Use of e-mail-specific protocols, such as POP3 and IMAP4, is prohibited, since they require specific firewall ports to be open.
  • Electronic messages are frequently inadequate in conveying mood and context. Users should carefully consider how the recipient might interpret a message before composing or sending the message.

3.2 Unacceptable Uses

  • Creating and exchanging messages that can be interpreted as harassing, obscene, racist, sexist, ageist, pornographic, or threatening, as defined by University policies.
  • Creating and exchanging information that is in violation of copyright or any other law. FDU is not responsible for an associate’s use of e-mail that breaks laws.
  • Personal communication that interferes with work responsibilities.
  • Opening file attachments from an unknown or untrustworthy source, or with a suspicious or unexpected subject line.
  • Sending unprotected healthcare data and personally identifiable consumer data or other confidential information to unauthorized people or in violation of FDU’s Acceptable Use Policy, or the Written Information Security Program (WISP). , Health Insurance Portability and Accountability Act and/or Gramm-Leach-Bliley Act regulations. Exceptions may be authorized by the University Chief Information Security Officer working with the employee’s supervisor. Communications that strain FDU’s network or other systems unduly, such as sending large files to large distribution lists.
  • Communications to distribution lists of only marginal interest to members, and replying to the entire distribution list when a personal reply is effective.
  • Communications with non-specific subject lines, inarticulate language, and without clear purpose.
  • Auto-forwarding e-mail messages from your University e-mail account.
  • Using any e-mail system, other than FDU’s e-mail system, for FDU-related communications.
  • Circulating chain letters and/or commercial offerings.
  • Circulating unprotected healthcare data and personally identifiable consumer data that would violate U.S. Federal HIPAA and GLB regulations. Exceptions may be authorized by the employee’s supervisor and in conjunction with the use of a University-approved e-mail encryption service.
  • Altering or forging the “From” line or any other attribution of origin contained in electronic mail or postings.
  • Using any of the University systems for sending what is commonly referred to as “SPAM” mail (unsolicited bulk email)

4.0 Student Responsibilities

Email is the primary means of official communication for Fairleigh Dickinson University. All students are responsible to check their FDU.edu email accounts regularly for communication from faculty, staff, and administrators.

FDU students are required to use their FDU.edu email account for all University-related correspondence except in such situations when Office365.fdu.edu is unavailable.

4.1 Acceptable Uses

  • Communicating in a professional manner.
  • Electronic messages are frequently inadequate in conveying mood and context. Users should carefully consider how the recipient might interpret a message before composing or sending the message.

4.1 Unacceptable Uses

  • Creating and exchanging messages that can be interpreted as harassing, obscene, racist, sexist, ageist, pornographic or threatening, as defined by University policies.
  • Creating and exchanging information that is in violation of copyright or any other law. FDU is not responsible for an individuals use of e-mail that breaks laws.
  • Opening file attachments from an unknown or untrustworthy source, or with a suspicious or unexpected subject line.
  • Auto-forwarding e-mail messages from your University e-mail account.
  • Using any e-mail system, other than FDU’s e-mail system, for FDU-related communications.
  • Circulating chain letters and/or commercial offerings.
  • Altering or forging the “From” line or any other attribution of origin contained in electronic mail or postings.
  • Using any of the University systems for sending what is commonly referred to as “SPAM” mail (unsolicited bulk email)
  • Use of e-mail-specific protocols such as POP3 and IMAP4 for access to non-FDU email accounts is prohibited since they require specific firewall ports to be open.

5.0 Privacy Guidelines

The University typically does not review the content of electronic messages or other data, files, or records generated, stored, or maintained on its electronic information resources; however, it retains the right to inspect, review, or retain the content of such messages, data, files, and records at any time without prior notification. Any such action will be taken for reasons the University, within its discretion, deems to be legitimate. These legitimate reasons may include, but are not limited to,

  • responding to lawful subpoenas or court orders;
  • investigating misconduct (including research misconduct);
  • determining compliance with University policies and the law; and
  • locating electronic messages, data, files, or other records related to these purposes.

FDU maintains the right to monitor and review e-mail activity to ensure compliance with this policy, as well as to fulfill FDU’s responsibilities under the laws and regulations of the jurisdictions in which it operates. Users should have no expectation of privacy.

  • Except as otherwise stipulated in this policy, on termination or separation from FDU, FDU will immediately deny access to e-mail, including the ability to download, forward, print or retrieve any message stored in the system, regardless of sender or recipient.
  • Except as otherwise stipulated in this policy, employees who leave FDU will have their mailbox deleted within six months of their termination date. The employee’s manager may request that access be given to another employee who may remove any needed information within the same six month time frame.
  • FDU reserves the right to intercept, monitor, review and/or disclose any and all messages composed, sent or received on the University e-mail system. Intercepting, monitoring and reviewing of messages may be performed with the assistance of content filtering software, or by designated FDU employees and/or designated external entities. Employees designated to review messages may include, but are not limited to, an employee’s supervisor or manager and/or representatives from the HR, legal or compliance departments.
  • FDU reserves the right to alter, modify, re-route or block the delivery of messages as appropriate. This includes but is not limited to:
    • Rejecting, quarantining or removing attachments and/or malicious code from messages that may pose a threat to FDU resources.
    • Rejecting or quarantining messages with suspicious content.
    • Rejecting or quarantining messages containing offensive language or topics.
    • Re-routing messages with suspicious content to designated FDU employees for manual review.
    • Appending legal disclaimers to messages.
  • Electronic messages are legally discoverable and permissible as evidence in a court of law.
  • Users of the University’s computing and electronic communications resources must understand that electronic messages, data, files, and other records generated, stored, or maintained on University electronic information resources may be electronically accessed, reconstructed, or retrieved by the University even after they have been deleted.

6.0 Security

As with any other type of software that runs over a network, e-mail users have the responsibility to follow sound security practices.

  • Users should not use the e-mail system to transfer sensitive data, except in accordance with FDU data protection policies. Refer to the Written Information Security Program (WISP). Sensitive data passed via e-mail over the Internet could be read by parties other than the intended recipients, particularly if it is clear text. Malicious third parties could potentially intercept and manipulate e-mail traffic.
  • In an effort to combat propagation of e-mail viruses, certain attachment types may be stripped at the University e-mail gateway. Recipients will be notified via e-mail when this occurs. Should this create a business hardship, users should contact the University Technical Assistance Center (UTAC).
  • Attachments can contain viruses and other malware. User should only open attachments from known and trusted correspondents. Suspicious attachments should be reported to the University Technical Assistance Center (UTAC).
  • Spam is automatically filtered at the University gateway in a highly efficient manner. Errors, whereby legitimate e-mail can be filtered as spam, while rare, can occur. If business-related mail messages are not delivered, users should check their local spam folder or the daily spam digest. If the message is not there, users should contact University Technical Assistance Center (UTAC).
  • Users will not be asked by OIRT or any other FDU group by e-mail for personal information such as usernames or passwords. Any such requests should not be responded to and should be referred to the University Technical Assistance Center (UTAC). Such approaches – known as phishing – are fraudulent approaches carried out for the purpose of unlawful exploitation.

7.0 Operational Guidelines

FDU employs certain practices and procedures in order to maintain the health and efficiency of electronic messaging resources, to achieve FDU objectives and/or to meet various regulations. These practices and procedures are subject to change, as appropriate or required under the circumstances.

  • For ongoing operations, audits, legal actions, or any other known purpose, FDU saves a copy of every e-mail message and attachment(s) to a secure location, where it can be protected and stored for three years. Recovery of messages from this store is prohibited for all but legal reasons.
  • To deliver mail in a timely and efficient manner, message size must be less than 25MB. Messages larger than 25MB will be automatically blocked and users will be notified of non-delivery. Should this create a business hardship, users should contact the University Technical Assistance Center (UTAC)
  • For all employees who handle sensitive information on a regular basis, to aid with ensuring that any accidental misdirection of emails are properly handled, the following disclaimer should be placed as part of and at the end of their signature block for all internal and external outbound emails.
    • This message and any attached documents contain information that may be confidential and privileged. If you have received this message in error, please immediately notify the sender and delete the message from your system without forwarding it to any other person.

Access to the content of electronic mail, data, files, or other records generated, stored, or maintained by any user may be requested from the University’s Associate Vice President of Technology Infrastructure for the reasons set forth below and shall be authorized as follows:

  1. by the Associate Vice President of Human Resources for all University employees;
  2. by either Dean of Students for students; or
  3. by the General Counsel for the purposes of complying with legal process and requirements or to preserve user electronic information for possible subsequent access in accordance with this policy.

In all cases, the Office of the General Counsel must be consulted prior to making a decision on whether to grant access. In the case of a time-critical matter, if the authorizing official is unavailable for a timely response, the General Counsel may authorize access.

All full-time faculty who retire from the University may keep their email address for life if they request to do so.

All full-time faculty who leave the University for reasons other than termination for cause, may request email forwarding for up to six months.

8.0 Governance and Enforcement

This policy was created with input from the University’s Data Security Incidence Response Team (DSIRT). At the request of the University’s Chief Information Security Officer (CISO), the DSIRT will review this policy annually to ensure that FDU is in compliance with internal or external requirements. FDU faces liability if users violate the terms of this policy. Therefore, willful or repeated violations of this Acceptable Use Policy for e-mail can result in informal or formal warnings, the loss of e-mail privileges, and other sanctions including termination. Any such discipline shall be in accordance with processes and procedures of Human Resources and subject to any protections afforded under the University’s agreement with “Office & Professional Employees International Union”, the “Faculty Handbook”, and similar documents. Third parties who violate this Policy may have their relationship with the University terminated and their access to campus restricted.

For assistance with this policy, please contact the University’s Chief Information Security Officer (CISO).

Exceptions to this policy may be authorized by the University Chief Information Security Officer working with the employee’s supervisor.

Policy violations should be reported immediately to the University’s Associate Vice President of Technology Infrastructure

The University reserves the right to suspend an e-mail account while investigating a complaint or troubleshooting a system or network problem.

This document will be reviewed semi-annually and is available both electronically and in printed form at each of the Campus Computing Centers.

It is the user’s responsibility to remain informed about the contents of this document.

Other Related and Applicable Policies


Last Modified:

Post Production Services

Resources for:
icon Close

Editing Process

Editing projects can vary greatly in complexity, from straightforward cuts to those requiring specific graphics, logos, music tracks, and lower-thirds. To ensure a smooth and efficient editing process, it’s important to communicate these requirements to our team prior to production. This allows us to be prepared and begin editing shortly after the video has been recorded.

For more complex video projects, involving a variety of unique elements like graphics, B-ROLL, transitions, voiceovers, and music tracks, collaboration between the editor and producer is key. This process typically involves the editor sending raw footage to the producer, who then uses the Frame.io platform to make edit decisions and provide additional stylistic guidance.

A preview version is created based on this feedback and emailed back to the producer for review. This cycle of review and revision may require several iterations, potentially two to four passes, before reaching a final version. This final product is then subject to approval by individuals responsible for the video project, ensuring that it meets all necessary standards and criteria.

Last Modified:

Printing at Home while Connected to FDU VPN

Resources for:
icon Close

Issue

When I am connected to the FDU VPN or Cisco AnyConnect Adapter, I am unable to print documents while working from home.

Cause

While connected to the FDU VPN network, you are unable to access any local printers or network devices / services to help protect your computer from various threats while working outside of the FDU Campus Network.

Resolution

In order to Print, please disconnect from the VPN client, and once your documents have printed, reconnect.

Tip

Print jobs will continue to queue while you’re connected to the FDU VPN and will print when you disconnect from the VPN.

You can also connect a USB cable from the printer to your laptop, where available, and you can remain on the FDU VPN and print anything you need.

Last Modified: