Resources

Explore our comprehensive IT resource library to discover a wealth of helpful information tailored to your needs. Utilize our filters to refine your search by role at FDU, department, or specific service for a more personalized experience.

Support
Resources Header

Printing in The Computer Labs

Resources for:
icon Close

Cost and Billing

To prevent excessive printing, the Department of Computing Services charges students a small fee for printing in the FDU Computer Labs. Black and white printing costs $0.05 per page and color printing is $0.25 per page.

Each student pays a technology fee which includes $10.00 of lab printing for each of the fall, spring, and summer semesters. Printing charges above the $10.00 per semester will appear as a Printing Fee on the next tuition bill.  

The $10 per semester printing credit is a standard allotment that expires each semester and has no cash value. No refunds will be given for pages not printed and unused prints for each semester’s allotment do not carry forward.

FDU staff and faculty members can use lab printers on a limited basis without charge for the purpose on conducting FDU business. Please use your department’s printer(s) as your primary printing resource. Faculty and staff members are limited to 200 pages per semester. Any attempt to print past this quota will result in an error message stating that the account does not have enough credit.

Note: You are responsible for all activity on your account. If you share your password with others or forget to log out, you will be held responsible for any activity done via your account, including printing charges. Computing Services strongly recommends that you use non-trivial passwords and log out completely before leaving a workstation.

View and Manage your Lab Printing

PaperCut Icon
  1. Hovering your cursor on the Papercut tray icon shows the Balance
  1. When you click on the Papercut tray icon, it opens a new window as seen below:
  1. Clicking on the “Details…” button on the lower right of the Balance within the Papercut window opens a web browser that will let the user log in and see their job history

Receiving Credit for Printing Errors

Credit will be given for errors caused by the printer (paper jams, toner problems, etc.) In such situations, please take the bad printouts to a Lab Assistant in Dreyfuss, Dickinson Hall, or University Hall. Your information will be taken, and reimbursement will be made in the form of a credit applied to your total charge for the semester. Situations which could have been prevented before printing, such as extra blank pages at the end of a document, will not be reimbursed.

Can I Use My Own Paper in These Printers?

No. Jobs are printed as they are received. There is the possibility that after loading the printer with your paper someone will print a job that will then be printed out on your paper. Transparencies and mailing labels are not allowed in the lab printers due to the high heat that laser printers use and the potential for damage to the equipment.

Last Modified:

Project Video Management

Resources for:
icon Close

Project Storage

Multimedia Services ensures the long-term preservation of all video material by storing and backing it up indefinitely on Sony CI, our cloud-based video storage library. This comprehensive backup encompasses everything from raw footage and project files to graphic files and the final program. Should your video project require updates in the future, we have the capability to access and revise the project as needed.

Project Delivery

Multimedia Services delivers final program material using Frame.io, offering a rapid, secure way to send large files. This platform facilitates team collaboration with features for leaving time-coded notes. While the Frame.io link enables previews and approvals by project stakeholders, it is not intended for long-term storage. After video approval and download, the content is archived and the link will expire.

Should you require access to a completed project, please email danielpando@fdu.edu.

Note

If you need to access to a previously completed project after the Frame.io link expires, requesting a new link may take 3-5 business days.

Last Modified:

Qualtrics

Resources for:
icon Close

What is Qualtrics?

Qualtrics is a simple web-based survey tool that provides the opportunity to conduct online survey research, evaluations, and many other data collection activities.

One of the many advantages is the ease of learning to use Qualtrics to:

  • Build surveys with multiple question styles
  • Distribute the surveys with a website link (there are other ways to distribute as well)
  • Analyze data collected

Of great importance, the university currently has a license for all faculty, staff, and students (some caveats with student accounts discussed if you all desire)

Benefits of Qualtrics

  • Simple and intuitive formatting of surveys
  • Visually appealing for respondents and survey builder
  • Computer and smartphone compatible
  • Flexibility of survey dissemination
  • Multiple data formats (e.g., CSV, TSV, XML, SPSS)

If you need assistance please contact Manish Wadhwa at (201)-692-7074 or Email Manish@fdu.edu

Last Modified:

Reporting Phishing or Junk Emails

Resources for:
icon Close

The Report Message add-in works with Outlook to allow you to report suspicious messages to Microsoft and manage how your Microsoft 365 email account treats these messages.

Messages marked as junk by your Microsoft 365 email account are automatically moved to your Junk Email folder. However, spammers and phishing attempts are continually evolving. If you receive a junk email in your Inbox, you can use the Report Message add-in to send the message to Microsoft, helping improve spam filters. If you find an email in your Junk Email folder that is not spam, you can use the add-in to mark it as legitimate, move it to your Inbox, and report the false positive to help Microsoft enhance the filters.

What is Junk Email?

Junk email, often referred to as spam, consists of messages you do not want to receive. These emails may advertise unwanted products or contain content that is offensive. If you select the Junk option, a copy of the message may be sent to Microsoft to improve spam filters, and the message will be moved to your Junk Email folder.

What is Phishing?

Phishing is a tactic used to trick you into disclosing personal information, such as bank account numbers and passwords. Phishing messages often appear legitimate but contain deceptive links that lead to fake websites. If you select Phishing, a copy of the message may be sent to Microsoft to improve filters, and the message will be moved to your Junk Email folder.

For more information and tips on spotting phishing emails, please refer to the following support article:

How to Spot a Phishing Scam

Microsoft has recently updated the process for reporting phishing or junk emails in Microsoft 365 Outlook and classic Outlook clients. With this update, a new Report Message button is now available in a dedicated tab within the Outlook client.

Outlook Web and Desktop Client
Classic Outlook

Reporting a Message as Phishing/Junk

By default, the Report button is inactive (grayed out). To activate the button and report a message as phishing or junk, the email must first be highlighted.

To report a message as Phishing or Junk:

  1. Click on the email message you want to report
  2. Click the “Report” button
  3. Select either “Report phishing” or “Report junk” to properly submit the message

Note

Clicking Report Phishing will delete the email.

  1. Click “OK” on the confirmation window

A secondary window will appear, explaining that regularly reporting junk emails helps improve junk email filtering in the future.

What is a Legitimate Email?

A legitimate email is one that comes from a sender you know, are expecting, or that has been mistakenly marked as junk. If this happens, you can use the Report button to mark the message as Not Junk. This will move the message from your Junk Email folder back to your Inbox.

Reporting Messages as Not Junk:

  1. Click on the “Junk Email” folder in Outlook
  2. Select the email message you want to report as “Not Junk
  3. Click the “Report” button
  4. Select “Not Junk” to properly report the message

Tip

If a legitimate email has been mistakenly reported as phishing, please open a SAMI Support ticket by clicking the Get Support button below.

Last Modified:

Reporting Threatening or Harassing Phone Calls

Resources for:
icon Close

If a call is threatening or harassing, immediately contact Public Safety at:

Campus Security Phone Numbers

  • Metro Campus: extension x2222, 1-(201)-692-2222
  • Florham Campus: extension x8888, 1-(973)-443-8888
  • Cambie Building: 1-(604)-786-6098
  • Georgia Building: 1-(236)-990-7036

For Emergencies For Emergencies

Call 911 if an emergency arises; in life-threatening situations or to report crimes in progress

Last Modified:

Safeguard Rules Under The Gramm-Leach-Bliley Act

Resources for:
icon Close

Responsible Office: Data Security Incident Response Team (DSIRT)
Responsible Official: Chief Information Officer, Chief Information Security Officer
DSIRT Approval: Neal M. Sturm on behalf of DSIRT

Effective Date: 12/01/2022
Last Review Date: 11/22/2022
Last Revision Date: 11/22/2022


  1. Purpose: This Policy sets the standards for developing, implementing, and maintaining reasonable administrative, technical, and physical safeguards to protect the security, confidentiality, and integrity of information covered by applicable provisions of the Gramm-Leach-Bliley Act (“GLBA”) and associated regulations. In particular, this document describes various measures being taken by FDU to (i) ensure the security and confidentiality of covered information, (ii) protect against any anticipated threats or hazards to the security of these records, and (iii) protect against the unauthorized access or use of such records or information in ways that could result in substantial harm or inconvenience (collectively, the “Program”). The practices described in this Policy are in addition to any institutional policies and procedures that may be required pursuant to other federal and state laws and regulations, including, without limitation, the Family Educational Rights and Privacy Act (“FERPA”).
  1. Scope of Program: The Program applies to any record containing “nonpublic personal information” about a student or other individual who has a continuing relationship with the University, whether the record is in paper, electronic, or other form, and which is handled or maintained by or on behalf of the University (“covered information”).(1) This includes any information that a student or other individual provides to FDU in connection with financial aid and tuition/fee collection efforts.

(1) Nonpublic personal information means: (i) personally identifiable financial information; and (ii) any list, description, or other grouping of consumers (and publicly available information pertaining to them) that is derived using any personally identifiable financial information that is not publicly available. “Personally identifiable financial information” means any information that a consumer provides to FDU to obtain a financial product or service, any information about a consumer resulting from a transaction involving a financial product or service between FDU and that consumer, or information that FDU otherwise obtains about a consumer in connection with the provision of a financial product or service to that consumer. A “consumer” is an individual, including a student, who obtains or has obtained a financial product or service from FDU that is to be used primarily for personal, family, or household purposes, or that individual’s legal representative. Examples include information an individual provides to FDU on an application for financial aid, account balance information and payment history, the fact that a student has received financial aid from FDU, and any information that FDU collects through an internet “cookie” in connection with a financial product or service.

  1. Roles and Responsibilities: Compliance and cooperation with this Policy is the responsibility of every employee at all levels within FDU. FDU’s Vice President and Chief Information Officer (CIO), assisted by the Chief Information Security Officer (the “CISO”), has the overall responsibility for coordinating information security pursuant to this Policy. The CIO or CISO may designate other representatives of FDU to help oversee and coordinate particular elements of the Program. The team will work closely with other members of the Office of Information Resources and Technology (OIRT), the Data Security & Incident Response Team (“DSIRT”), the University Risk Manager, the Vice President for Human Resources, and the General Counsel, as well as relevant academic and administrative units throughout the University to implement the Program.
  1. Risk Assessment: The CIO and CISO will help the relevant offices of FDU to identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of covered information that could result in the unauthorized disclosure, misuse, alteration, destruction, or other compromise of the information; and to assess the sufficiency of the safeguards in place to controls these risks. This effort will be embodied in a risk assessment document.

    The risk assessment is a written document that includes:

    (i) Criteria for the evaluation and categorization of identified security risks or threats that FDU faces;

    (ii) Criteria for the assessment of the confidentiality, integrity, and availability of FDU’s information systems and covered information, including the adequacy of the existing controls in the context of the identified risks or threats that FDU faces; and

    (iii) Requirements describing how identified risks will be mitigated or accepted based on the risk assessment and how the information security program will address the risks.
  1. Access Controls: The Program includes implementing and periodically reviewing access controls, including technical and, as appropriate, physical controls to:

    (i) Authenticate and permit access only to authorized users to protect against the unauthorized acquisition of covered information; and

    (ii) Limit authorized users’ access only to covered information that they need to perform their duties and functions, or, in the case of third parties, to access their own information.

The Program is designed to identify and help manage safeguards for the data, personnel, devices, systems, and facilities that enable FDU to achieve its mission – efforts are prioritized in accordance with our objectives and risk strategy.

FDU has adopted authentication and access controls as needed to implement the “principle of least privilege” around accessing covered data, meaning that no user should have access greater than is necessary for legitimate FDU purposes Data owners within each applicable University unit approve and periodically review access. This includes a periodic review by the Office of Enrollment Services of all users who have access to Enrollment Services security tracks in the Colleague System and a periodic review by other administrative departments that maintain students’ financial aid information regarding user access to the information.

These efforts also include employee training regarding these controls. The OIRT will coordinate with representatives in FDU’s Office of Finance, Office of Financial Aid, Enrollment Services and other offices to evaluate on a regular basis the effectiveness of the University’s training, procedures, and practices relating to access to and use of student records, including financial aid information as well as financial information. This evaluation will include assessing the effectiveness of the University’s current policies and procedures in this area. All employees are required to train in FDU’s Written Information Security Program (WISP) (training.fdu.edu), which program is incorporated by reference into this Policy.

  1. Monitoring Unauthorized Users and Use: FDU has implemented policies, procedures, and controls designed to monitor and log the activity of authorized users and detect unauthorized access or use of, tampering with, covered information. Various specific measures are identified in Appendix 1.

    These measures will include assessing the University’s current policies and procedures relating to FDU’s Acceptable Use Policy for Computer Usage, Confidentiality Agreement and Security Policy, FDU Procedure on Handling Data on Separating Employees, Password Policy, Policy for Acceptable Use of Email, Software Compliance & Distribution Policy, and Written Information Security Program. The CISO will also coordinate with the CIO and the OIRT to assess procedures for monitoring potential information security threats associated with software systems and for updating such systems by, among other things, implementing patches or other software fixes designed to deal with known security flaws.
  1. Monitoring the Effectiveness of Safeguards: FDU periodically conducts penetration tests and vulnerability assessments on its network and key information systems. These measures are designed to test and monitor the effectiveness of the safeguards’ key controls, systems, and procedures, including those to detect actual and attempted attacks on, or intrusions into, FDU’s information systems.

    For those systems where continuous monitoring (or other methods to detect, on an ongoing basis, changes in information systems that may create vulnerabilities), is not practical, FDU will conduct:

    (i) Annual penetration testing on FDU’s information systems identified by OIRT based on relevant identified risks under the risk assessment; and

    (ii) Vulnerability assessments of FDU’s information systems, including systemic scans or reviews of information systems designed to identify publicly known security vulnerabilities in FDU’s information systems based on the risk assessment, at least every six months; and whenever there are material changes to FDU’s operations or business arrangements; and whenever there are circumstances that OIRT knows (or has reason to know) may have a material impact on FDU’s information security program.
  1. Detecting, Preventing and Responding to Attacks: The OIRT and University Risk Manager will on a regular basis evaluate procedures for and methods of detecting, preventing, and responding to attacks or other system failures and existing network access and security policies and procedures, as well as procedures for coordinating responses to network attacks and developing incident response teams and policies. The FDU Data Security Incident & Response Team implements all aspects of, oversees other Departments’ adherence to, and documents all incident response activities. Upon determination by the CISO and General Counsel that a Security Incident triggers breach notification laws, the University will report the breach to relevant federal or state regulatory authorities by their designated methods; and, where applicable, the U.S. Department of Education, including details about date of breach (suspected or known); impact of breach (e.g. number of records); method of breach (e.g. hack, accidental disclosure); information security program point of contact – email and phone details; remediation status (e.g. complete, in process); and next steps (as needed).

    These measures will be documented in a comprehensive incident response plan that addresses:

    (i) The goals of the incident response plan;

    (ii) The internal processes for responding to a security event;

    (iii) The definition of clear roles, responsibilities, and levels of decision-making authority;

    (iv) External and internal communications and information sharing;

    (v) Identification of requirements for the remediation of any identified weaknesses in information systems and associated controls;

    (vi) Documentation and reporting regarding security events and related incident response activities; and

    (vii) The evaluation and revision as necessary of the incident response plan following a security event.
  1. Overseeing In-House Developed Applications and External Service Providers: The OIRT leadership working in collaboration with the CISO will help ensure that software applications and solutions developed in-house by FDU, including modifications to third-party programs, meet the safeguard standards of this Policy. The CIO, CISO and other appropriate OIRT leaders will also coordinate with FDU’s contract review teams to raise awareness of, and to institute methods for, selecting and retaining only those service providers that can maintain appropriate safeguards for nonpublic financial information of students and other third parties to which they will have access. In addition, the CIO and CISO will work with the General Counsel and the University Risk Manager to develop and incorporate standard, contractual protections applicable to third-party service providers, which will require the providers to implement and maintain appropriate safeguards.

    Utilizing a variety of automated risk assessment tools such as Bitsight, OIRT periodically assesses FDU’s service providers on the risk they present and the continued adequacy of their safeguards.
  1. Encryption: FDU adopts methods to protect by encryption covered information held or transmitted by the University by encrypting both in transit over external networks and at rest. To the extent that encryption of covered information, either in transit over external networks or at rest, is infeasible, FDU secures the covered information using effective alternative compensating controls reviewed and approved by the CISO.
  1. Multifactor authentication: FDU has implemented multi-factor authentication for any individual accessing the University’s information systems, except where the CISO has approved in writing the use of reasonably equivalent or more secure access controls.

    Multi-factor authentication is defined as authentication through verification of at least two of the following types of authentication factors:

    (1) Knowledge factors, such as a password;

    (2) Possession factors, such as a token; or

    (3) Inherence factors, such as biometric characteristics.
  1. Data Retention and Disposal Controls: FDU has in place procedures for the secure disposal of covered information in any format, consistent with the University’s operations and other legitimate business purposes, except where required to be retained by law or regulation, or where targeted disposal is not reasonably feasible due to the manner in which the information is maintained. Where information is not needed to be retained, the University will take reasonable measures to include processes for disposal of covered information no later than two years after the last date the information is used for legitimate University purposes. The Program includes periodic review of our data retention policy to minimize the unnecessary retention of data.
  1. Adjustments to Program: Risk assessment activities will be periodically performed to reexamine the reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of covered information that could result in the unauthorized disclosure, misuse, alteration, destruction, or other compromise of such information, and to reassess the sufficiency of any safeguards in place to control these risks. The CISO is responsible for evaluating and recommending adjustments to the program based on the undertaken risk identification and assessment activities, as well as any material changes to FDU’s operations or other circumstances that may have a material impact on the Program.
  1. Reports to the Board: The Vice President of OIRT will submit written reports to the Board of Trustees at least once each calendar year. The report will include the following information:

    (1) The overall status of the Program and FDU’s compliance with the safeguard requirements under the GLBA;

    (2) Material matters related to the Program, addressing issues such as risk assessment, risk management and control decisions, service provider arrangements, results of testing, security events or violations and management’s responses thereto, and recommendations for changes in the information security program.

The CIO may approve deviations to the processes set forth in this Policy to meet changing conditions at the University, so long as such deviations are designed to achieve the safeguard goals set forth in this Policy and do not violate the GLBA and other applicable laws.

Appendix 1
Certain Additional Specific Safeguards

Periodically (generally at least once each year), leaders from applicable University departments and units are surveyed regarding their processes for safeguarding covered information, using a standard template. Results are compiled and conveyed to the CIO for review and follow-up, including adopting and incorporating results in the University-wide Risk Assessment.

The CIO will determine which departments and units should receive the assessment survey, based on their handling of covered information. Currently, the units are: OIRT, Office of Enrollment Services, Credits and Collections, Admissions, International Admissions, Financial Aid, Veteran Services, Accounts Payable, Management Information Systems, Conference & Summer Programs, School of Pharmacy, and the Controller’s Office.

The standard assessment template is as follows.

  1. Designate an employee or employees to coordinate the unit’s information security program.
  2. Identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of customer information that could result in the unauthorized disclosure, misuse, alteration, destruction or other compromise of such information, and assess the sufficiency of any safeguards in place to control these risks. At a minimum, such a risk assessment should include consideration of risks in each relevant area of your operations, including:
  • Unauthorized disclosure of sensitive information by employees through intentional or unintentional methods.
  • Unauthorized access, disclosure, misuse, alteration or destruction of information on hosts.
  • Detection and prevention of attacks on the systems.
  • Unsecured transmission of data.
  • Physical security of computer systems, network equipment, backups and paper materials.
  • Managing data integrity and system failures.
  1. Design and implement information safeguards to control the risks you identify through risk assessment, and regularly test or otherwise monitor the effectiveness of the safeguards’ key controls, systems, and procedures.
  1. Unauthorized disclosure of sensitive information by employees through intentional or unintentional methods:
  2. Unauthorized access, disclosure, misuse, alteration or destruction of information on hosts:
  3. Detection and prevention of attacks on the systems:
  4. Unsecured transmission of data:
  5. Physical security of computer systems, network equipment, backups and paper materials:
  6. Managing data integrity and system failures:
  1. Oversee service providers, by: (1) Taking reasonable steps to select and retain service providers that are capable of maintaining appropriate safeguards for the customer information at issue; and (2) Requiring FDU’s service providers by contract to implement and maintain such safeguards.
  1. Evaluate and adjust FDU’s information security program in light of the results of the testing and monitoring required by this Policy; any material changes to FDU’s operations or business arrangements; or any other circumstances that are known or have reason to be known as having a material impact on FDU’s information security program.

The following is an example of a completed assessment survey, from OIRT:

Gramm Leach Bliley Security Program
Office of Information Resources Technology
Standards for Safeguarding Customer Information

(a) Designate an employee or employees to assist the CIO in the coordination of the Program.

In addition to the CISO, the Director of Systems and the Director of Networking are the designated employees for the Office of Information Resources Technology

(b) Identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of customer information that could result in the unauthorized disclosure, misuse, alteration, destruction or other compromise of such information, and assess the sufficiency of any safeguards in place to control these risks. At a minimum, such a risk assessment should include consideration of risks in each relevant area of your operations, including:

  • Unauthorized disclosure of sensitive information by employees through intentional or unintentional methods.
  • Unauthorized access, disclosure, misuse, alteration or destruction of information on hosts.
  • Detection and prevention of attacks on the systems.
  • Unsecured transmission of data.
  • Physical security of computer systems, network equipment, backups and paper materials.
  • Managing data integrity and system failures.

(c) Design and implement information safeguards to control the risks you identify through risk assessment, and regularly test or otherwise monitor the effectiveness of the safeguards’ key controls, systems, and procedures.

  1. Unauthorized disclosure of sensitive information by employees through intentional or unintentional methods:
  • Employees go through mandatory Written Information Security Program (WISP) Training
  • Prior to any IT requests, User Information Is checked against WISP to ensure they are current with training
  • Employees are provided training and are closely observed by managers before being given access to sensitive information. Training includes password policy and management, physical security of cabinets, storage, and equipment rooms, and recognizing fraudulent attempts to obtain sensitive information.
    • Policy, social engineering, keystrokes loggers, etc.
  • All employees must sign and accept the University’s “Acceptable Use Policy” and the “Confidentiality Agreement” if applicable.
  • Requests for sensitive information are directed to individuals with proper training and authority to review the request.
  • Potential employees are subjected to a background check before being hired by the University.
  • Updated IT Informational website that includes documentation of all policies and procedures specific to securing data.
  • Use of Data Loss Prevention tool to proactively monitor and correct non-compliance issues
  • Access to information is granted only to the extent required for the employee to perform their job functions.

2) Unauthorized access, disclosure, misuse, alteration or destruction of information on hosts:

  • Passwords are required for access to any system with sensitive information.
  • Strong password policies are in place where possible.
  • Multi-factor authentication to access sensitive systems for all faculty, adjuncts, staff and students.
  • Multi-factor authentication for all admin accounts.
  • Auditing systems (e.g. Change Management Process, Netwrix, Microsoft ATP) are used to track and report on changes to critical files.
  • Notifications of employee terminations are received prior to or on date of termination. Immediate notification is received when circumstances warrant instant suspension of access to systems.

3) Detection and prevention of attacks on the systems:

  • Auditing systems (e.g., Netwrix) are used to detect attempts to breach systems or alter system configurations.
  • System logs are reviewed daily for evidence of attacks.
  • Policies are in place to regularly apply patches to systems.
  • A firewall is in place for perimeter protection.
  • Obsolete systems are being replaced by newer systems that are better supported by hardware and software vendors. Most systems include host-based firewalls.
  • The wired portion of the university network is entirely switched to minimize the possibility of packet sniffing and other similar attacks.
  • WPA2 Enterprise is deployed and available for wireless accessible locations.
  • Endpoint protection software is in place, which automatically updates servers & clients.

4) Unsecured transmission of data:

  • Connections to all systems are using modern cryptographic techniques.
  • University standard practice is to use HTTPS for web services; all publicly accessible web traffic is proxied through load balancers.
  • SFTP is used to transmit data to various vendors securely.
  • EFax services deployed, ensuring fax transmission are encrypted both in transit and at rest.
  • Virtru software for encrypted email communication of sensitive and Personally Identifiable Information
  • 7-Zip is used to encrypt files being sent to and from vendors.

5) Physical security of computer systems, network equipment, backups and paper materials:

  • All computer systems and core network equipment are physically secured in locked rooms or cabinets.
  • Essential services are monitored for availability and alerts are sent when a system or service becomes unavailable.
  • Printed material with personal information is shredded when no longer needed.
  • The main datacenters and several ancillary MDF’s have heat and humidity detection systems as well as a fire suppression system.
  • Alarms with motion detectors are in place in all data centers. The university department of Public Safety monitors the alarms.
  • Security cameras are set and on 24 hour recording on both main data centers
  • A card access system controls access to the data centers and IT administrative offices.

6) Managing data integrity and system failures:

  • Daily backups of host systems are performed.
  • Network hardware configurations are backed up weekly.
  • Out of band capabilities exist to support network management and large-scale outages.
  • Continual off-site backup of all FDU owned workstations.
  • Mirroring of networked file services across campuses is occurring.
  • UPS systems provide backup power to central data centers.
  • Extending backup capabilities to include off-site backup of all University systems
  • A backup generator is in place for the main data centers.
  • A disaster recovery plan has been developed.

(d) Oversee service providers, by: (1) Taking reasonable steps to select and retain service providers that are capable of maintaining appropriate safeguards for the customer information at issue; and (2) Requiring FDU’s service providers by contract to implement and maintain such safeguards.

Contracts require appropriate safeguarding measures be taken by the vendor. Third Party Assessment evaluation using Industry best practice tools prior to executing contracts.

(e) Evaluate and adjust FDU’s information security program in light of the results of the testing and monitoring required by this Policy; any material changes to FDU’s operations or business arrangements; or any other circumstances that are known or have reason to be known as having a material impact on FDU’s information security program.

OIRT continually performs extensive reviews of applicable written policies and has a continuous program in place to review applicable policies and procedures.

OIRT periodically (generally annually) performs an eMail Phishing test to all full-time faculty and staff. FDU uses a third party as the tool for performing the test. Individuals who fail the Phishing test are required to complete remedial training with a passing score. Supervisors are made aware of those who fail the test and are encouraged to speak with their employees.

OIRT conducts comprehensive vulnerability assessments aligned to the NIST Risk Management Framework (RMF) that included external vulnerability scanning, penetration testing, netflow analysis of our IP ranges, review of IT and cybersecurity-specific and FDU-wide documentation, and dark web footprinting.

OIRT takes action to increase the cadence of monitoring and reacting to server, desktop and mobile device alerts, ensure compliance of website configurations and deploy security measures to ensure security of email system and reduce spoofing of emails.


Last Modified:

Safeguards Against Cybercrime

Resources for:
icon Close

Being connected to the internet suggests that the internet is connected to you. Without concern and proper safeguards to protect the information you share, you are at a greater risk of cybercrime.

The university assumes its share of responsibility to protect sensitive information but you must do the same. The vast majority of data and identify thefts are not the result of enterprise breaches but a direct consequence of individuals who are complacent about sharing sensitive information or unaware of the risks.

Please take a moment to review this video to obtain a better understanding of how you can help protect yourself from cybercrime.

Last Modified:

SAMI Shorts

Resources for:
icon Close

SAMI Shorts are brief informational videos that provide key insights on a variety of IT-related topics. Most videos run 45–90 seconds, include closed captioning, and are also available in text format. As new SAMI Shorts are released, we will periodically share them with the community via email. You may also receive a related SAMI Short as part of a response to a SAMI Support ticket.

View our entire catalog of SAMI Shorts:

SAMI Shorts Catalog

Last Modified:

SAMI Support Public Request Form

Resources for:
icon Close

The SAMI Support portal requires a valid NetID and password, along with DUO multi-factor authentication, for access. Upon entry, users can create new tickets, review open or closed requests, and explore the IT Knowledgebase for solutions to common issues. Access the support portal using the button below:

SAMI Support Portal

If you need to open a request and cannot access SAMI Support for any of the reasons below, please complete this request form to contact the Fairleigh Dickinson University Technical Assistance Center (UTAC). A member of the IT support team will assist you via phone call or email.

  • I do not have a valid University issued NetID
  • I am not able to authenticate through DUO
  • I have not set up my DUO account
  • I am a vendor without a University issued NetID
  • I am an admitted student
  • I am a newly hired employee or adjunct
  • My FDU account is locked
  • I need my Net ID password reset and have already attempted to do that through identity.fdu.edu

Tip

The form below is not compatible with Dark Mode. For an optimal experience, disable Dark Mode either in your device’s system settings or directly from the FDU IT website menu bar.

SAMI Support Public Request

Last Modified:

Secure Deletion Steps for Personal Information

Resources for:
icon Close

Introduction

This document outlines the university approved process for securely deleting Personal Information (PI) and Protected Health Information (PHI) after the PI or PHI has been encrypted.

Prerequisite

Eraser Portable® Secure Data Remove software needs to be installed on your computer. Please contact the Fairleigh Dickinson University Technical Assistance Center (UTAC) to request the installation of this software. A member of USAN will assist with the installation and setup of the software.

Document Deletion Process

To securely delete an unencrypted version of a document that contain PI and/or PHI that has been encrypted, complete the following steps:

  1. Find the “Secure Deletion” shortcut folder on your computer desktop screen
  2. Cut and paste the unencrypted version of the file to be deleted into this folder
  3. Find the “Eraser Portable” shortcut folder on your computer desktop screen and click to open the folder
  4. Double Click on “EraserPortable.exe“. The screen below will appear
  5. Click on the Green Run arrow to erase the file securely
secure 1
  1. A dialogue box will appear
  1. Click “Yes
  2. When the deletion process completes, you will see a report appear
  1. You may check your “Secure Deletion” folder to see if all documents have been erased

Outlook E-mail Deletion Process

To securely remove emails which contain PI and PHI from your Outlook client, complete the following steps:

  1. Delete the email from your Inbox and/or Sent items folder
  2. Delete the email from your Deleted Items
  3. Go to “Recover Deleted Items
  4. Highlight Deleted Items Folder
  1. Then go to Folder > Recover Deleted Items
  1. Highlight email which requires permanent deleting and select “Purge Selected Items” and then click “OK“. Now message is permanently out of your email system
  1. Finally, click “OK” on the following screen
secure8
Last Modified: