Your search for "policy" returned 45 results
  1. Information Security Policy (E2.214)
    Prepared by Office of Vice President for Information Technology & CIO and the Office of Vice President for Legal Affairs and University General Counsel Please click the following URL for the most recent version of the University of Hawai‘i
  2. UH POLICY: Official Campus Domain Names
    The chancellors of the 10 University of Hawaii campuses decided in 2002 and subsequently reaffirmed standardization of campus domain names as follows:manoa.hawaii.eduhilo.hawaii.eduwestoahu.hawaii.eduhawaii.hawaii.eduhonolulu.hawaii.edukapiola
  3. University of Hawai'i Information Technology Services Policy on Equal Access to ITS Resources for Persons with Disabilities
    Introduction The University of Hawai‘i Information Technology Services (ITS) department is committed to a policy of equal access to its web content, facilities, and services. These policies and procedures ensure that persons with disabilities
  4. ITS Data Backup Policy
      The following information is provided to help users of Information Technology Services (ITS) systems understand the nature of the ITS backup procedures and the availability of information beyond the date on which it is deleted by the users.
  5. IT POLICY: UH System Level Website Domain Names
    UH system level units and programs as well as multi-campus programs and initiatives may request a system level URL. All UH System URL requests will be categorized within a logical site structure, be it organizational (unit, department, office) or th
  6. IT POLICY: UH System Level Domain Names
    UH system level units and programs as well as multi-campus programs and initiatives may request a system level domain name in the form: program.hawaii.edu All other units, programs and initiatives must create their subdomain in their respective c
  7. IT Policy and Guidelines: UH Manoa Wireless Networks
    As with all shared resources of the University, policies and guidelines are established to ensure equitable and reliable access to limited resources for all members of the University community. The UH Manoa network infrastructure is considered to be
  8. Virtual Server: File Level Backup Policy
    The following information is provided to help virtual server customers of Information Technology Services (ITS) Contract Services understand the nature of the  backup procedures and the availability of information beyond the date on which it i
  9. UH POLICY: Non-EDU Domain Names on UH Network
    University of Hawaii units are expected to use a hawaii.edu domain name for all services provided through the UH network.  This makes it clear that the University is providing the resources to support the service.  Non-University activities
  10. Policies
    Use and Management of Information Technology Resource Policy (E2.210): Please Read and understand the responsibility of owning and using an account here at UH. Student Conduct Code ref: http://www.hawaii.edu/help/accounts/poli
  11. ITS Computer Support Policy
    The Information Technology Services (ITS) Academic Technologies section provides technical support via email, telephone, and walk-in to UH faculty, staff and students systemwide through the ITS Help Desk. Contact the ITS Help Desk for support by ca
  12. How to Turn on Google Consumer Apps for Your Google@UH Account
    Open your web browser to http://www.hawaii.edu/google/extra Figure 1. Google@UH Consumer Apps Click the Login button. Login with your UH Username and password, for which you want to turn on Consumer Apps.
  13. VirusScan Enterprise detects legitimate Outlook attachments with multiple extensions as infected
    For McAfee VirusScan Enterprise 8.5 or 8.7 Symptoms: User receives email with subject line beginning with "McAfee Email Alert" and message similar to following: Attachment file : Spreadsheet 1.25.07.xls\1.OLE Scanner Detected: Su
  14. What are the privacy policies for my UH Email Account?
    Under normal circumstances, email is considered private and is not subject to audit or review except as stated in UH Executive Policy E2.210: "Use and Management of Information Technology Resources" Section V: "Ownership and Disclosure
  15. INFOBITS: Data Backup Do's & Don'ts
    by Deanna Pasternak Computer Data Backups Whether you’re a Macintosh or Windows user, regularly backing up your data is critical in case of a computer problem. ITS recommends backing up your data regularly to external media, such as a CD,
  16. Google@UH Consumer Apps FAQ
    Under an agreement with Google, the University of Hawaii (UH) offers two types of Google applications through Google@UH: Core applications (Core Apps) and Consumer applications (Consumer Apps). To use the Consumer Apps with your Google@UH account, yo
  17. IT Security @ UH
    General Information Getting your PC unblocked on the UH Network Password Guidelines Securely Deleting Electronic Information How to Securely Delete Electr
  18. DMCA Takedown Procedures at UH
    A Digital Millennium Copyright Act (DMCA) infringement notice (also known as a DMCA takedown notice) is sent to the University when unauthorized copyrighted materials are found by copyright owners and/or their agents.  The takedown notice includ
  19. Securing your Computer & Protecting your Information
    [Print Friendly Version]   Use of all University of Hawaii information Technology Resources are governed by UH Executive Policy: E2.210 — Use and Management of Information Technology Resources.  Continued use of your UH Use
  20. Virtual Server: How to Install and Configure Backups (Bacula) on a RHEL 6 Server
    SUMMARY The Bacula Enterprise Edition (BEE) backup service is the optional daily backup service listed in the ITS VMware Hosted Solutions page. Backups are file level only. If you are a virtual server customer and have purchased the daily
  21. List Owner's Responsibilities
    A list owner is entrusted with its members’ personal information (email address and name), and this carries certain responsibilities with regards to ensuring privacy and security. You must determine what level of security is most appropriate fo
  22. Purchasing Personal Computers for UH Departments
    This article Askus 1264 is intended for UH departmental computer purchases. UH departments may use either the NASPO ValuePoint (formerly NASPO-WSCA) Contract Price List 15-05 or follow UH Small Purchasing procedures (APM A8.250). The State Procureme
  23. Protecting Sensitive Information at UH
    The University of Hawaii (UH) is committed to protecting the personal, confidential information that it is entrusted with.  Beginning in 2004, UH has implemented the UH Number as a unique, personal identifier as a replacement for Social Security
  24. INFOBITS: Personal Webpage = Your Calling Card on the WWW
    by Justin Fung What is a personal webpage? A personal webpage, World Wide Web page, is created by an individual and contains content of a personal nature. Personal webpages can be as simple as plain text, similar to a Word document, or it can b
  25. Copyright in the Digital Age
    Intellectual property is the lifeblood of a university, and all members of the university community should respect the work of others inside and outside the academy. University of Hawaii Executive Policy E2.210: "Use and Management of Informatio
  26. Approval letter template for requesting the use of a non-hawaii.edu domain name on the UH network
    <insert campus/division logo here> <date> TO:        <name>            <Chancellor | Vice President> FROM:    
  27. UH staff: How do I get my UH Username?
    You may request your UH Username online from the UH Account Management page by clicking on the "Get a UH Username!" link. Your account should be ready within six (6) minutes. Most services, such as the SECE, will be available to you once yo
  28. Faculty: How do I get my UH Username?
    You may request your UH Username online from the UH Username Management page by clicking on the "Get a UH Username!" link. Your UH Username should be ready within six minutes. Most services, such as MyUH, will be available to you once your
  29. Student: How do I get my UH Username?
    You may request your UH Username online from the UH Username Management page by clicking on the "Get a UH Username!" link. Your UH Username should be ready within six minutes. Most services, such as MyUH, will be available to you once your
  30. UH ITS SurveyShare
    UH SurveyShare √ SurveyShare Features √ Request a SurveyShare Account √ Institutional Review Board √ Broadcasting √ Frequently Asked Questions (FAQ's) √ Resources √ Contact Information The Universit
  31. Virtual Server: How to install and configure backups (Bacula Enterprise) on a Windows Server
    SUMMARY: The Bacula backup service is the optional daily backup service listed in the ITS VMware Hosted Solutions page. Backups are FILE LEVEL only. If you are a VM customer and have purchased this service, a client will need to be configured on yo
  32. UH and the NASPO ValuePoint (WSCA) contract
    The State Procurement Office (SPO) issued a new SPO Price List Contract No. 15-05 named "NASPO ValuePoint Computer Equipment including Related Peripherals and Services", effective Oct. 1, 2015 through March 31, 2017. SPO contract 15-05 repl
  33. Sensitive Information Paper Document Disposal
    Sensitive information is defined in UH Policy E2.214 and includes information like social security number, student records, health information, personal financial information, drivers license numbers, etc. www.hawaii.edu/apis/ep/e2/e2214.pdf. &n
  34. Open Source Software Alternatives
    This is a brief list of open source software alternatives for paid consumer software suites and applications. The information is provided for convenience and does not implicitly or explicitly constitute an endorsement or recommendation for any of the
  35. Sample Copyright Notification Letter
    (Click here for PDF version of this form.) @font-face { font-family: "Arial"; }@font-face { font-family: "Times"; }@font-face { font-family: "ArialMT"; }p.MsoNormal, li.MsoNormal, div.MsoNormal { margin: 0in 0in 0.0001pt; font-size: 12
  36. Personal Home Page Policies
    The server that the UH Personal Home Pages resides on is administered by Information Technology Services (ITS) and is intended to allow faculty, staff, and students space to create personal home pages. We wish to retain the ability to publish pages f
  37. Frequently Asked Questions about the UH Server Registration & Scanning Requirements
    Q.  Why am I required to register and scan my servers? A.  As a result of the recent data breaches, the University of Hawaii is implementing a new, systemwide Information Security Program to better protect the university's sensitive inform
  38. UH affiliate: How do I get my UH Username?
    Before you can get your UH Username from the online request system, ITS requires a memo from your sponsoring UH department or office on departmental letterhead identifying you and officially requesting that you have access to UH services and resource
  39. How do I add LDAP authentication for Mac OS X 10.11 & newer?
    It is possible to configure your client Mac OS X computer to authenticate against the UH LDAP server. Follow the steps below to setup LDAP authentication. This document will be limited in scope to just accomplishing the authentication process. It wil
  40. Network Etiquette
    Certain situations call for proper protocol to be observed. In bowling, one does not interrupt the person bowling in adjacent lanes by throwing the ball while they are already in the process of doing so. In tennis, returning a ball that is obviously
  41. Security (or lack of it) on the Internet
    The modern age of surfing the internet has produced many ways for unwanted email (spam) to get to you. Some are annoying by sending you unwanted information about a product being sold, but others more recently are highly invasive with potential of id
  42. How do I add LDAP authentication for Mac OS X 10.9 & 10.10?
    It is possible to configure your client Mac OS X computer to authenticate against the UH LDAP server. Follow the steps below to setup LDAP authentication. This document will be limited in scope to just accomplishing the authentication process.
  43. Password Guidelines
    The days of using simple words, a single character, or a blank password are gone. Today, easy passwords can be cracked or guessed within hours or even minutes. Since the information on your computer is precious and potentially confidential, you need
  44. Creating Personal Homepages
    Welcome to Creating Personal Homepages. One of the privileges of having a UH Username is that you are allowed to create a personal homepage in your account that is viewable to the world. PLEASE READ! Pages which include offensive images or sounds
  45. Securing Network Printers and Multi-Function Devices
    Network Printers and Multi-Function Devices (MFD) are common in offices because they provide the ability to copy, print, scan, and fax from one central machine that is shared by many. The MFD's typically store information and are connected to the ne