Resources

Search our resource library below to find helpful information. You can fitler by your role at FDU as well by department or service.

icon Help Desk
Resources Header

Purchasing Lenovo PC and Apple MacBook Pro Laptop Accessories

Resources for:
icon Close

The following PC laptop accessories for university-owned Apple MacBook Pro and Lenovo laptops may be purchased from our approved vendors. Please use the following PC laptop accessories list and vendor contact information below to help guide you when obtaining optional laptop accessories.

Lenovo PC Laptop Accessories

A/C Adapter for T14 or T14s Laptop

Only one A/C adapter will be provided with the new Lenovo laptops. If a user needs a second A/C adaptor they will need to order the part below. The A/C adapters for the current Lenovo laptops will not be compatible with the new models.

AccessoryDescriptionPart NumberCost
A/C Power AdapterLenovo AC power adapter (USB Type-C)4X20M26252 $54.99 from Lenovo
A/C Power AdapterLenovo AC power adapter (USB Type-C)4X20M26252$52.59 from CDW-G
A/C Power AdapterLenovo AC power adapter (USB Type-C)4X20M26252$54.99 from GovConnection.com
Prices are noted as of July 2022
close
Docking Stations
AccessoryDescriptionPart NumberInputsCost
Multi-Monitor Docking StationLenovo ThinkPad Universal USB-C Dock – This model is essential for connecting more than one external monitor to up to three external monitors. 40AY0090US1 HDMI, 2 DisplayPort$204.40 from CDW-G
Multi-Monitor Docking StationLenovo ThinkPad Universal Thunderbolt 4 Dock – This model can connect one 8K display and up to four 4K display external monitors. 40B00135US1 HDMI, 2 DisplayPort288.79 from CDW-G
Single and Dual-Monitor Docking StationLenovo ThinkPad Hybrid USB-C with USB-A Dock – This model supports a single external monitor setup or dual external monitor setups, up to two UHD 4K resolution monitors.40AF0135US2 HDMI, 2 DisplayPort$252.22 from CDW-G

Single Monitor Travel Hub or Docking StationLenovo Powered USB-C Travel Hub This model supports a single external monitor setup. Features one ethernet port, one USB Type-A port, one USB 3.1 Gen 1 Type-A port, and one USB-C power port.4X90S923811 HDMI, 1 VGA$82.28 from CDW-G
Prices are noted as of May 2023
close
Keyboards

Keyboards will not need to be replaced for users that already have them. Users that are new to the PC laptop docking station setup may want to buy a wired USB keyboard. There are no IT requirements for purchasing keyboards; however, if users want to go with a basic model, they can order the below part number.

AccessoryDescriptionPart NumberCost
Wired USB KeyboardLenovo Preferred Pro II USB Keyboard – US English4X30M86879$26.17 from CDW-G
close
Mice

There are no IT requirements for purchasing external wired USB mice; however, if a user wants to go with a basic model, they can order the below part number.

AccessoryDescriptionPart NumberCost
USB MouseLenovo Essential USB Mouse4Y50R20863$18.80 from CDW-G
close
Wireless Keyboard and Mouse Combo

There are no IT requirements for purchasing an external wireless keyboard and mouse combo set; however, if a user would like to go with a basic model, they can order the below part number.

AccessoryDescriptionPart NumberCost
Wireless KeyboardLogitech MK850 Performance Keyboard and Mouse (wireless)920-008219$67.07 from CDW-G
close
Monitors

Users ordering the ThinkPad USB-C Dock Gen 2 Multi-Monitor Docking Station will need an accompanying monitor with at least an HDMI connection.

For users who already have a monitor and wish to use it with one of the new docking stations, your existing monitor will need to have either HDMI or Display Port (DP) connection. If your monitor only has Display Port (DP), you will need an HDMI to Display Port (DP) adapter. Users should check their current monitor connections for compatibility; if new monitors are required or desired, please choose from the list below.

AccessoryDescriptionPart NumberInputsFeaturesCost
24″ External MonitorLenovo ThinkVision T24i-30 – LED monitor – Full HD (1080p) – 23.8″63CFMAR1USHDMI, DisplayPort,
VGA
Built-in Camera: No
Built-in USB Hub: Yes
$273.36 from CDW-G. This monitor is the preferred 24″ model to purchase
24″ External MonitorLenovo ThinkVision T24v-30 – LED monitor – Full HD (1080p) – 23.8″63D8MAR3USHDMI, DisplayPort, VGABuilt-in Camera: Yes
Built-in USB Hub: Yes
$290.69 from CDW-G. This monitor is the preferred 24″ model to purchase if the Lenovo ThinkVision T24i-30, listed above, is unavailable or the user requires a built-in web camera
24″ External MonitorLenovo ThinkVision P24h-30 – LED monitor – QHD – 24″63B3GAR6USHDMI, DisplayPort, USB-C Built-in Camera: No
Built-in USB Hub: Yes
$421.60 from CDW-G
24″ External MonitorLG UltraGear 24GQ50B-B – LED monitor – Full HD (1080p) – 23.8″24GQ50B-BHDMI, DisplayPortBuilt-in Camera: No
Built-in USB Hub: No
$157.85 from CDW-G
27″ External MonitorLenovo ThinkVision P27q-30 – LED monitor – QHD – 27″63A2GAR1USHDMI, DisplayPortBuilt-in Camera: No
Built-in USB Hub: Yes
$394.66 from CDW-G. This monitor is the preferred 27″ model to purchase
27″ External MonitorLenovo ThinkVision T27hv-30 – LED monitor – QHD – 27″63D6UAR3USHDMI, DisplayPort,
USB-C
Built-in Camera: Yes
Built-in USB Hub: Yes
$546.74 from CDW-G
27″ External MonitorLenovo ThinkVision T27i-30 – LED monitor – Full HD (1080p)63A4MAR1USHDMI, DisplayPort, VGABuilt-in Camera: No
Built-in USB Hub: Yes
$286.84 from CDW-G
27″ External MonitorLG 27BK430H-B – LED monitor – Full HD (1080p) – 27″ – HDR27BK430H-BHDMI, VGABuilt-in Camera: No
Built-in USB Hub: No
$160.74 from CDW-G
Prices are noted as of May 2023
close

Apple MacBook Pro Laptop Accessories

A/C Power Adapters for 14-inch & 16-inch MacBook Pro
Accessory DescriptionPart NumberCost

A/C Power Adapter
Apple USB-C – Power Adapter –
96 Watt
MX0J2AM/A$63.19 from CDW-G

A/C Power Adapter
Apple Power Cable –
24 pin USB-C to MagSafe 3 – 6.6 ft
MLYV3AM/A$41.65 from CDW-G
close
Docking Stations
AccessoryDescriptionPart NumberInputsCost
Single Monitor Docking Station or HubHyperDrive Ultimate USB-C Hub – This model supports a single external monitor setup. One HDMI port supports video resolutions up to 4K at 30 Hz. Featuring three USB 3.1 Gen 1 Type-A ports, 1 USB Type-C Power Delivery port, one ethernet port, and one 3.5mm audio jack, plus SD and microSD card readers.HD30FGRAY1 HDMI, 1 Mini DisplayPort, 1 VGA$89.99 from B&H.com. This model is the preferred single monitor hub to purchase
Dual-Monitor Docking Station or HubHYPER HyperDrive Viper 10-in-2 USB Type-C Hub (Space Gray) – This model is essential for connecting up to two external monitors. This hub provides two HDMI and three USB 3.1 Gen 1 Type-A ports, as well as ports for Gigabit Ethernet, 3.5mm audio, and USB Type-C with 60W of power delivery. UHS-1 SD and microSD card readers are also present.HD392-GRAY2 HDMI$129.99 from CDW-G.
$129.99 from B&H.com. This model is the preferred dual-monitor hub to purchase
Single Monitor Docking Station or HubHYPER Hyperdrive 4-In-1 USB Type-C HubThis model supports a single external monitor setup. Supports a single 4K display at 60 Hz via the one HDMI port. Featuring two USB 3.2 Gen 1 Type-A ports and one USB Type-C port to deliver up to 100W of pass-through power to your laptop or tablet.HD411 HDMI$59.99 from B&H.com. This model does not contain an ethernet port
Single Monitor Docking Station or HubHyperDrive 5-Port USB Type-C Hub This model supports a single external monitor setup. Supports a single 4K monitor at 60 Hz via the one HDMI port. Features two USB Type-A ports, one ethernet port, and one USB Type-C port to deliver up to 86W of power to your laptop or tablet.HDMB21 HDMI$84.59 from CDW-G
Single Monitor Travel Hub or Docking StationLenovo Powered USB-C Travel Hub This model supports a single external monitor setup. Features one ethernet port, one USB Type-A port, one USB 3.1 Gen 1 Type-A port, and one USB-C power port.4X90S923811 HDMI, 1 VGA$82.28 from CDW-G
close
Monitors
AccessoryDescriptionPart NumberInputsFeaturesCost
24″ External MonitorASUS ProArt PA247CV – LED monitor – Full HD (1080p) – 23.8″PA247CVHDMI, DisplayPort,
USB-C
Built-in Camera: No
Built-in USB Hub: Yes
$201.69 from CDW-G

You may also refer to the Lenovo PC Laptop Accessories – Monitors section above to make an external monitor choice selection for the Apple MacBook Pro.

close

Accessories

USB Flash Drives

There are no IT requirements for purchasing USB flash drives. USB 3.0 is recommended. Users are reminded about adhering to the Written Information Security Program (WISP). No WISP-protected data may be placed on external devices without specific authorization, as indicated in the policy.

close
External Hard Drives

There are no IT requirements for purchasing external hard drives. USB 3.0 is recommended. Users are reminded about the Written Information Security Program (WISP). No WISP-protected data may be placed on external devices without specific authorization as indicated in the policy.

close
Printers / Scanners

For a current list of approved printers and scanners, please reach out to the Purchasing Department. Please remember that most printers don’t have USB printer cables included upon purchase.

Note

While most modern printers support wireless connectivity, wireless printing capabilities may not be enabled on any printer without the explicit authorization of the Director of Networking.

close

Purchasing

FDU Purchasing

To purchase any of the laptop accessories listed above, please submit a PO to the Purchasing Department. Users need to get a quote from either vendor through the contact information below. Please reference the item numbers from the attached quotes. Unless stated otherwise, the products listed are currently available. Prices may vary. Other University approved vendor reseller information and common products that departments may be interested in purchasing can be found by visiting:

Departments should consolidate orders as much as possible. There is no additional discount for quantity. Departments should designate the ‘ship to’ to their respective department. Vendors’ contact information is listed below.

close
Sample Purchase Order (PO) Quotes

Tip

View the Sample PO quotes to help guide you when obtaining your own quote prior to submitting to the Purchasing Department.

Lenovo:

Attn: Jeremiah Pope
Email: jpope@lenovo.com

SAMPLE Lenovo PO Quote

CDW-G:

Vinny Nariyani
Email: vinnnar@cdwg.com

and

Joe Masulli
Email: joemasu@cdwg.com

SAMPLE CDW-G PO Quote Page 1
SAMPLE CDW-G PO Quote Page 2
SAMPLE CDW-G PO Quote Page 3
SAMPLE CDW-G PO Quote Page 4

GovConnection, Inc.

Eric Hadler
Email: eric.hadler@connection.com

SAMPLE GovConnection, Inc. PO Quote

B&H Photo:

1-800-947-8003
newjersey@bandh.com

SAMPLE B&H PO Quote
close
Last Modified: Copy Link

Qualtrics

Resources for:
icon Close

What is Qualtrics?

Qualtrics is a simple web-based survey tool that provides the opportunity to conduct online survey research, evaluations, and many other data collection activities.

One of the many advantages is the ease of learning to use Qualtrics to:

  • Build surveys with multiple question styles
  • Distribute the surveys with a website link (there are other ways to distribute as well)
  • Analyze data collected

Of great importance, the university currently has a license for all faculty, staff, and students (some caveats with student accounts discussed if you all desire)

Benefits of Qualtrics

  • Simple and intuitive formatting of surveys
  • Visually appealing for respondents and survey builder
  • Computer and smartphone compatible
  • Flexibility of survey dissemination
  • Multiple data formats (e.g., CSV, TSV, XML, SPSS)

If you need assistance please contact Manish Wadhwa at (201)-692-7074 or Email Manish@fdu.edu

Last Modified: Copy Link

Reporting Phishing or Junk Emails

Resources for:
icon Close
Outlook Web Access (Office365.fdu.edu)
  1. Click on the email that you would like to Mark as Junk or Mark as Phishing
  1. Click the down arrow next to the Junk button
  1. Click on the appropriate button to report the email (Junk, Phishing or Block)
  1. Once you report the email, a copy of the email is automatically sent to the FDU University Systems team and Microsoft for review to improve the spams going forward
close
Microsoft Outlook for Windows or Mac
  1. Click on the email that you would like to Mark as Junk or Mark as Phishing
  1. Click on the Report Message button
  1. Click the appropriate option button (Junk or Phishing)
  1. Once you report the email, a copy of the email is automatically sent to the FDU University Systems team and Microsoft for review to improve the spams going forward
close
Last Modified: Copy Link

Reporting Threatening or Harassing Phone Calls

Resources for:
icon Close

Reporting Threatening or Harassing Phone Calls

The following procedures should be followed:

Contact Public Safety x2222 Metro Campus or x8888 for Florham Campus.

If the call is threatening, kindly contact Public Safety regarding threatening or harassing phone calls.

Call 911 If an Emergency Arises

Campus Emergency

Dialing 66 from your desk phone you will be connected to Public Safety. This is to be used for Emergency purposes only.

Last Modified: Copy Link

Resources for Remote Learning and Operations

Resources for:
icon Close
Illustration of user in home setting using a computer

Welcome to FDU’s resource guide for remote learning and continued operations. Here, both faculty and students will find helpful support articles to continue your academic studies remotely.

Whether it is a snow day, a scheduled absence, or emergency, offering classes remotely can help provide continuity or recover lost class time. These resources outlines steps and tools that can be used to connect with students remotely and deliver course materials.

General Resources

One Drive can be a powerful tool for both Faculty and Students to share files. Here’s a quick guide to help you find and install OneDrive.

Learn how to create new documents in Office 365 and share them with others to collaborate.

Zoom is a web-based video conferencing tool that allows users to meet online, with or without video. Zoom users can choose to record sessions, collaborate on projects, and share or annotate on one another’s screens, all with one easy-to-use platform.

Zoom experts host free and interactive live training webinars daily. Get up to speed in less than an hour. Please select the time zone that fits best for you when registering for one of our live training webinars.

Having trouble connecting to Zoom? Here are some common steps you can take to troubleshoot.

Find that you need to access your FDU email on the go? Here’s how to load the app onto a mobile device.

According to FDU’s Written Information Security Program (WISP), in no case should they be sending or storing WISP protected information without the explicit authorization of the Chief Information Security Officer (CISO). If approved, these instructions will provide you with guidance on the methodology.

As a result of campus closure, student access to Adobe Creative Cloud in labs and classrooms is not available. Adobe has provided temporary at-home access for impacted students and faculty, so that they can continue their work remotely.

Students

Download Office 365.

This article explains how to create a Zoom Meeting from within your course in Webcampus so you can collaborate with your fellow students.

In this starter guide, students can learn about all the basics, from your NetID to Webmail to Webcampus and finally Webadvisor. This is a great way to make sure you can connect to all your FDU resources!

Helpful steps to take in preparation for a Zoom class.

SPSS is a software package used for statistical analysis produced by IBM. Many of our students in various majors rely heavily on this software to complete lessons and assignments. To help transition to an online learning environment, FDU students can access a student-use version of SPSS. Please contact the University Technical Assistance Center (UTAC) to request access to this software.

Please make sure to request the correct version for Mac or Windows, and please inform them of the course you are currently registered in.

Faculty & Staff

NWN Cloud Self-Service portal allows you to manage and view your Cisco Unified Communications phone settings online. Follow this resource to setup your account.

Learn how to forward calls coming into your University phone to a cell phone or home phone and how to block Caller ID.

NOTE: For main office line forwarding to another number your department Head/Owner of the Main Line needs to open a ticket with a help desk to get the mainline forwarded to a designated number you request.

Learn how to access and listen or change your voicemail messages/prompts remotely.

Setup a softphone on your computer to make and receive calls from your campus phone number.

Here you can find some helpful tips to lead productive & inclusive Zoom Classes with your students.

Zoom comes pre-stocked with numerous security features designed to control online classrooms, prevent disruption, and help educators effectively teach remotely. Here are some best practices for securing your virtual classroom using Zoom.

Want to play a video during your Zoom session? By default the video will show, but without any sound. Watch this video for instruction on how to play a video with sound.

Personal is a stand-alone application designed to be used by instructors on their personal computers to generate video recordings. The software enables you to create video recording across multiple computing platforms via a unified interface. That means instructors can universally record and share video on Mac and Windows computers, inside or outside of the classroom, with an identical user experience on each device.

Follow this easy-to-use guide for connecting your all-in-one, joining your wifi, and connecting to VPN from home.

Faculty and staff will need VPN to access Webui, Informer, Synoptix, HRIS, Purchase Order Online form and Perceptive Content. For Faculty and staff using their personal devices, this article will assist you in setting up your VPN.

Connecting to VPN for the first time? Here’s a guide to help you.

Having issues printing at home with your network printer? Follow these steps and tips as a resolution.

Users of Perceptive software can access Perceptive through a web interface rather than using the Windows client. The web interface is called Perceptive Experience. There is a little less functionality with the web interface as compared to the client, however, the most important functions still exist. Users can easily search documents that they have access to and for now, certain offices can use the web interface for capturing documents in Perceptive after being set up with this capability.

You can access your Home Drive or Department share from home using you FDU-Issued computer. This helpful guide will walk you through the steps. Home drives and/or department shares are not accessible from a personal PC.


Last Modified: Copy Link

Safeguard Rules Under The Gramm-Leach-Bliley Act

Resources for:
icon Close

Revised Date: 11/22/2022


  1. Purpose: This Policy sets the standards for developing, implementing, and maintaining reasonable administrative, technical, and physical safeguards to protect the security, confidentiality, and integrity of information covered by applicable provisions of the Gramm-Leach-Bliley Act (“GLBA”) and associated regulations. In particular, this document describes various measures being taken by FDU to (i) ensure the security and confidentiality of covered information, (ii) protect against any anticipated threats or hazards to the security of these records, and (iii) protect against the unauthorized access or use of such records or information in ways that could result in substantial harm or inconvenience (collectively, the “Program”). The practices described in this Policy are in addition to any institutional policies and procedures that may be required pursuant to other federal and state laws and regulations, including, without limitation, the Family Educational Rights and Privacy Act (“FERPA”).
  2. Scope of Program: The Program applies to any record containing “nonpublic personal information” about a student or other individual who has a continuing relationship with the University, whether the record is in paper, electronic, or other form, and which is handled or maintained by or on behalf of the University (“covered information”). [1] This includes any information that a student or other individual provides to FDU in connection with financial aid and tuition/fee collection efforts.

[1] Nonpublic personal information means: (i) personally identifiable financial information; and (ii) any list, description, or other grouping of consumers (and publicly available information pertaining to them) that is derived using any personally identifiable financial information that is not publicly available. “Personally identifiable financial information” means any information that a consumer provides to FDU to obtain a financial product or service, any information about a consumer resulting from a transaction involving a financial product or service between FDU and that consumer, or information that FDU otherwise obtains about a consumer in connection with the provision of a financial product or service to that consumer. A “consumer” is an individual, including a student, who obtains or has obtained a financial product or service from FDU that is to be used primarily for personal, family, or household purposes, or that individual’s legal representative. Examples include information an individual provides to FDU on an application for financial aid, account balance information and payment history, the fact that a student has received financial aid from FDU, and any information that FDU collects through an internet “cookie” in connection with a financial product or service.

  1. Roles and Responsibilities: Compliance and cooperation with this Policy is the responsibility of every employee at all levels within FDU. FDU’s Vice President and Chief Information Officer (CIO), assisted by the Chief Information Security Officer (the “CISO”), has the overall responsibility for coordinating information security pursuant to this Policy. The CIO or CISO may designate other representatives of FDU to help oversee and coordinate particular elements of the Program. The team will work closely with other members of the Office of Information Resources and Technology (OIRT), the Data Security & Incident Response Team (“DSIRT”), the University Risk Manager, the Vice President for Human Resources, and the General Counsel, as well as relevant academic and administrative units throughout the University to implement the Program.
  2. Risk Assessment: The CIO and CISO will help the relevant offices of FDU to identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of covered information that could result in the unauthorized disclosure, misuse, alteration, destruction, or other compromise of the information; and to assess the sufficiency of the safeguards in place to controls these risks. This effort will be embodied in a risk assessment document.

    The risk assessment is a written document that includes:

    (i) Criteria for the evaluation and categorization of identified security risks or threats that FDU faces;

    (ii) Criteria for the assessment of the confidentiality, integrity, and availability of FDU’s information systems and covered information, including the adequacy of the existing controls in the context of the identified risks or threats that FDU faces; and

    (iii) Requirements describing how identified risks will be mitigated or accepted based on the risk assessment and how the information security program will address the risks.
  1. Access Controls: The Program includes implementing and periodically reviewing access controls, including technical and, as appropriate, physical controls to:

    (i) Authenticate and permit access only to authorized users to protect against the unauthorized acquisition of covered information; and

    (ii) Limit authorized users’ access only to covered information that they need to perform their duties and functions, or, in the case of third parties, to access their own information.

    The Program is designed to identify and help manage safeguards for the data, personnel, devices, systems, and facilities that enable FDU to achieve its mission – efforts are prioritized in accordance with our objectives and risk strategy.

    FDU has adopted authentication and access controls as needed to implement the “principle of least privilege” around accessing covered data, meaning that no user should have access greater than is necessary for legitimate FDU purposes Data owners within each applicable University unit approve and periodically review access. This includes a periodic review by the Office of Enrollment Services of all users who have access to Enrollment Services security tracks in the Colleague System and a periodic review by other administrative departments that maintain students’ financial aid information regarding user access to the information.

    These efforts also include employee training regarding these controls. The OIRT will coordinate with representatives in FDU’s Office of Finance, Office of Financial Aid, Enrollment Services and other offices to evaluate on a regular basis the effectiveness of the University’s training, procedures, and practices relating to access to and use of student records, including financial aid information as well as financial information. This evaluation will include assessing the effectiveness of the University’s current policies and procedures in this area. All employees are required to train in FDU’s Written Information Security Program (WISP) (training.fdu.edu), which program is incorporated by reference into this Policy.
  2. Monitoring Unauthorized Users and Use: FDU has implemented policies, procedures, and controls designed to monitor and log the activity of authorized users and detect unauthorized access or use of, tampering with, covered information. Various specific measures are identified in Appendix 1.

    These measures will include assessing the University’s current policies and procedures relating to FDU’s Acceptable Use Policy for Computer Usage, Confidentiality Agreement and Security Policy, FDU Procedure on Handling Data on Separating Employees, Password Policy, Policy for Acceptable Use of Email, Software Compliance & Distribution Policy, and Written Information Security Program. The CISO will also coordinate with the CIO and the OIRT to assess procedures for monitoring potential information security threats associated with software systems and for updating such systems by, among other things, implementing patches or other software fixes designed to deal with known security flaws.
  3. Monitoring the Effectiveness of Safeguards: FDU periodically conducts penetration tests and vulnerability assessments on its network and key information systems. These measures are designed to test and monitor the effectiveness of the safeguards’ key controls, systems, and procedures, including those to detect actual and attempted attacks on, or intrusions into, FDU’s information systems.

    For those systems where continuous monitoring (or other methods to detect, on an ongoing basis, changes in information systems that may create vulnerabilities), is not practical, FDU will conduct:

    (i) Annual penetration testing on FDU’s information systems identified by OIRT based on relevant identified risks under the risk assessment; and

    (ii) Vulnerability assessments of FDU’s information systems, including systemic scans or reviews of information systems designed to identify publicly known security vulnerabilities in FDU’s information systems based on the risk assessment, at least every six months; and whenever there are material changes to FDU’s operations or business arrangements; and whenever there are circumstances that OIRT knows (or has reason to know) may have a material impact on FDU’s information security program.
  4. Detecting, Preventing and Responding to Attacks: The OIRT and University Risk Manager will on a regular basis evaluate procedures for and methods of detecting, preventing, and responding to attacks or other system failures and existing network access and security policies and procedures, as well as procedures for coordinating responses to network attacks and developing incident response teams and policies. The FDU Data Security Incident & Response Team implements all aspects of, oversees other Departments’ adherence to, and documents all incident response activities. Upon determination by the CISO and General Counsel that a Security Incident triggers breach notification laws, the University will report the breach to relevant federal or state regulatory authorities by their designated methods; and, where applicable, the U.S. Department of Education, including details about date of breach (suspected or known); impact of breach (e.g. number of records); method of breach (e.g. hack, accidental disclosure); information security program point of contact – email and phone details; remediation status (e.g. complete, in process); and next steps (as needed).

    These measures will be documented in a comprehensive incident response plan that addresses:

    (i) The goals of the incident response plan;

    (ii) The internal processes for responding to a security event;

    (iii) The definition of clear roles, responsibilities, and levels of decision-making authority;

    (iv) External and internal communications and information sharing;

    (v) Identification of requirements for the remediation of any identified weaknesses in information systems and associated controls;

    (vi) Documentation and reporting regarding security events and related incident response activities; and

    (vii) The evaluation and revision as necessary of the incident response plan following a security event.
  1. Overseeing In-House Developed Applications and External Service Providers: The OIRT leadership working in collaboration with the CISO will help ensure that software applications and solutions developed in-house by FDU, including modifications to third-party programs, meet the safeguard standards of this Policy. The CIO, CISO and other appropriate OIRT leaders will also coordinate with FDU’s contract review teams to raise awareness of, and to institute methods for, selecting and retaining only those service providers that can maintain appropriate safeguards for nonpublic financial information of students and other third parties to which they will have access. In addition, the CIO and CISO will work with the General Counsel and the University Risk Manager to develop and incorporate standard, contractual protections applicable to third-party service providers, which will require the providers to implement and maintain appropriate safeguards.

    Utilizing a variety of automated risk assessment tools such as Bitsight, OIRT periodically assesses FDU’s service providers on the risk they present and the continued adequacy of their safeguards.
  2. Encryption: FDU adopts methods to protect by encryption covered information held or transmitted by the University by encrypting both in transit over external networks and at rest. To the extent that encryption of covered information, either in transit over external networks or at rest, is infeasible, FDU secures the covered information using effective alternative compensating controls reviewed and approved by the CISO.
  3. Multifactor authentication: FDU has implemented multi-factor authentication for any individual accessing the University’s information systems, except where the CISO has approved in writing the use of reasonably equivalent or more secure access controls.

    Multi-factor authentication is defined as authentication through verification of at least two of the following types of authentication factors:

    (1) Knowledge factors, such as a password;

    (2) Possession factors, such as a token; or

    (3) Inherence factors, such as biometric characteristics.
  4. Data Retention and Disposal Controls: FDU has in place procedures for the secure disposal of covered information in any format, consistent with the University’s operations and other legitimate business purposes, except where required to be retained by law or regulation, or where targeted disposal is not reasonably feasible due to the manner in which the information is maintained. Where information is not needed to be retained, the University will take reasonable measures to include processes for disposal of covered information no later than two years after the last date the information is used for legitimate University purposes. The Program includes periodic review of our data retention policy to minimize the unnecessary retention of data.
  5. Adjustments to Program: Risk assessment activities will be periodically performed to reexamine the reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of covered information that could result in the unauthorized disclosure, misuse, alteration, destruction, or other compromise of such information, and to reassess the sufficiency of any safeguards in place to control these risks. The CISO is responsible for evaluating and recommending adjustments to the program based on the undertaken risk identification and assessment activities, as well as any material changes to FDU’s operations or other circumstances that may have a material impact on the Program.
  6. Reports to the Board. The Vice President of OIRT will submit written reports to the Board of Trustees at least once each calendar year. The report will include the following information:

    (1) The overall status of the Program and FDU’s compliance with the safeguard requirements under the GLBA;

    (2) Material matters related to the Program, addressing issues such as risk assessment, risk management and control decisions, service provider arrangements, results of testing, security events or violations and management’s responses thereto, and recommendations for changes in the information security program.

    The CIO may approve deviations to the processes set forth in this Policy to meet changing conditions at the University, so long as such deviations are designed to achieve the safeguard goals set forth in this Policy and do not violate the GLBA and other applicable laws.

Appendix 1

Certain Additional Specific Safeguards

Periodically (generally at least once each year), leaders from applicable University departments and units are surveyed regarding their processes for safeguarding covered information, using a standard template. Results are compiled and conveyed to the CIO for review and follow-up, including adopting and incorporating results in the University-wide Risk Assessment.

The CIO will determine which departments and units should receive the assessment survey, based on their handling of covered information. Currently, the units are: OIRT, Office of Enrollment Services, Credits and Collections, Admissions, International Admissions, Financial Aid, Veteran Services, Accounts Payable, Management Information Systems, Conference & Summer Programs, School of Pharmacy, and the Controller’s Office.

The standard assessment template is as follows:

(A) Designate an employee or employees to coordinate the unit’s information security program.

(B) Identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of customer information that could result in the unauthorized disclosure, misuse, alteration, destruction or other compromise of such information, and assess the sufficiency of any safeguards in place to control these risks. At a minimum, such a risk assessment should include consideration of risks in each relevant area of your operations, including:

  • Unauthorized disclosure of sensitive information by employees through intentional or unintentional methods.
  • Unauthorized access, disclosure, misuse, alteration or destruction of information on hosts.
  • Detection and prevention of attacks on the systems.
  • Unsecured transmission of data.
  • Physical security of computer systems, network equipment, backups and paper materials.
  • Managing data integrity and system failures.

(C) Design and implement information safeguards to control the risks you identify through risk assessment, and regularly test or otherwise monitor the effectiveness of the safeguards’ key controls, systems, and procedures.

  1. Unauthorized disclosure of sensitive information by employees through intentional or unintentional methods:
  2. Unauthorized access, disclosure, misuse, alteration or destruction of information on hosts:
  3. Detection and prevention of attacks on the systems:
  4. Unsecured transmission of data:
  5. Physical security of computer systems, network equipment, backups and paper materials:
  6. Managing data integrity and system failures:

(D) Oversee service providers, by: (1) Taking reasonable steps to select and retain service providers that are capable of maintaining appropriate safeguards for the customer information at issue; and (2) Requiring FDU’s service providers by contract to implement and maintain such safeguards.

(E) Evaluate and adjust FDU’s information security program in light of the results of the testing and monitoring required by this Policy ; any material changes to FDU’s operations or business arrangements; or any other circumstances that are known or have reason to be known as having a material impact on FDU’s information security program.


The following PDF is an example of a completed assessment survey from OIRT:


Last Modified: Copy Link

Safeguards Against Cybercrime

Resources for:
icon Close

Being connected to the internet suggests that the internet is connected to you. Without concern and proper safeguards to protect the information you share, you are at a greater risk of cybercrime.

The university assumes its share of responsibility to protect sensitive information but you must do the same. The vast majority of data and identify thefts are not the result of enterprise breaches but a direct consequence of individuals who are complacent about sharing sensitive information or unaware of the risks.

Please take a moment to review this video to obtain a better understanding of how you can help protect yourself from cybercrime.

Last Modified: Copy Link

SAMI Support Public Request Form

Resources for:
icon Close

SAMI Support requires a valid NetID and password, as well as DUO multi-factor authentication in order to access. Once the portal is accessed, you have the ability to generate a new ticket, review existing or closed tickets & view the IT Knowledgebase for information that can assist you with resolving problems. The SAMI Support Portal can be accessed by using the button below:

SAMI Support Portal

If you need to open a request and cannot access SAMI Support for any of the reasons below, please complete this request form or contact the Fairleigh Dickinson University Technical Assistance Center (UTAC). A member of the IT support team will assist you via phone call or email.

  • I do not have a valid University issued NetID
  • I am not able to authenticate through DUO
  • I have not set up my DUO account
  • I am a vendor without a University issued NetID
  • I am an admitted student
  • I am a newly hired employee or adjunct
  • My FDU account is locked
  • I need my Net ID password reset and have already attempted to do that through identity.fdu.edu

Note

The form below is not compatible with dark mode. For an optimal experience, disable dark mode either in your device’s system settings or directly from the FDU IT website.

SAMI Support Public Request

Last Modified: Copy Link

Secure Deletion Steps for Personal Information

Resources for:
icon Close

Introduction

This document outlines the university approved process for securely deleting Personal Information (PI) and Protected Health Information (PHI) after the PI or PHI has been encrypted.

Prerequisite

Eraser Portable® Secure Data Remove software needs to be installed on your computer. Please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) to request the installation of this software. A member of USAN will assist with the installation and setup of the software.

Document Deletion Process

To securely delete an unencrypted version of a document that contain PI and/or PHI that has been encrypted, complete the following steps:

  1. Find the “Secure Deletion” shortcut folder on your computer desktop screen
  2. Cut and paste the unencrypted version of the file to be deleted into this folder
  3. Find the “Eraser Portable” shortcut folder on your computer desktop screen and click to open the folder
  4. Double Click on “EraserPortable.exe“. The screen below will appear
  5. Click on the Green Run arrow to erase the file securely
secure 1
  1. A dialogue box will appear
  1. Click “Yes
  2. When the deletion process completes, you will see a report appear
  1. You may check your “Secure Deletion” folder to see if all documents have been erased

Outlook E-mail Deletion Process

To securely remove emails which contain PI and PHI from your Outlook client, complete the following steps:

  1. Delete the email from your Inbox and/or Sent items folder
  2. Delete the email from your Deleted Items
  3. Go to “Recover Deleted Items
  4. Highlight Deleted Items Folder
  1. Then go to Folder > Recover Deleted Items
  1. Highlight email which requires permanent deleting and select “Purge Selected Items” and then click “OK“. Now message is permanently out of your email system
  1. Finally, click “OK” on the following screen
secure8
Last Modified: Copy Link

Secure Encryption Steps for Personal Information

Resources for:
icon Close

This document outlines the University approved process for securely encrypting Personally Identifiable Information (PII).

Prerequisite

7Zip software needs to be installed on the end user’s computer. Please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) to request the installation of this software. If justification is needed, notify UTAC that 7Zip is needed to encrypt documents containing PII.

Process

Encrypting Files and Folders

To encrypt a single file, find the file in your directory (or where you have it saved).

  1. Right click on the document (do not open the document)
  2. On the drop down menu, Find 7zip
  3. Click “Add to archive…
  4. When 7zip opens, there are three (3) settings which need to be changed:
    • Archive Format = Select zip from drop down
    • Encryption Method = select AES-256 from drop down
    • Check “show password” and type in a password that the user creates
    • Click “OK
    • A 7Zip Archive with the encrypted document will now appear in your directory

NOTE: Do not utilize any password that you use to access internal systems. The password cannot be recovered if forgotten.

Editing Encrypted Files and Folders

When editing an encrypted file or folder, you must make sure that you leave the 7zip archive open. If you close the archive, you will be able to work on the document, but it will not save.

Opening an Encrypted File or Folder

To open an encrypted file or folder:

  1. Right click on the 7Zip archive
  2. On the drop down menu, find 7Zip
  3. Click on the first “Open archive”
  4. Click to open your document

Saving an Encrypted File or Folder

To save an encrypted file or folder:

  1. Save the document as normal
  2. Upon closing document, the 7Zip archive will prompt the user to save the changes
Last Modified: Copy Link