Your search for "policy/" returned 42 results
  1. Information Security Policy (E2.214)
    Prepared by Office of Vice President for Information Technology & CIO and the Office of Vice President for Legal Affairs and University General Counsel Please click the following URL for the most recent version of the University of Hawai‘i
  2. Policies
    Use and Management of Information Technology Resource Policy (E2.210): Please Read and understand the responsibility of owning and using an account here at UH. Student Conduct Code ref: http://www.hawaii.edu/help/accounts/poli
  3. UH POLICY: Official Campus Domain Names
    The chancellors of the 10 University of Hawaii campuses decided in 2002 and subsequently reaffirmed standardization of campus domain names as follows:manoa.hawaii.eduhilo.hawaii.eduwestoahu.hawaii.eduhawaii.hawaii.eduhonolulu.hawaii.edukapiola
  4. What are the privacy policies for my UH Email Account?
    Under normal circumstances, email is considered private and is not subject to audit or review except as stated in UH Executive Policy E2.210: "Use and Management of Information Technology Resources" Section V: "Ownership and Disclosure
  5. VirusScan Enterprise detects legitimate Outlook attachments with multiple extensions as infected
    For McAfee VirusScan Enterprise 8.5 or 8.7 Symptoms: User receives email with subject line beginning with "McAfee Email Alert" and message similar to following: Attachment file : Spreadsheet 1.25.07.xls\1.OLE Scanner Detected: Su
  6. University of Hawai'i Information Technology Services Policy on Equal Access to ITS Resources for Persons with Disabilities
    Introduction The University of Hawai‘i Information Technology Services (ITS) department is committed to a policy of equal access to its web content, facilities, and services. These policies and procedures ensure that persons with disabilities
  7. INFOBITS: Data Backup Doís & Doníts
    by Deanna Pasternak Computer Data Backups Whether you’re a Macintosh or Windows user, regularly backing up your data is critical in case of a computer problem. ITS recommends backing up your data regularly to external media, such as a CD,
  8. ITS Security Tip of the Week Archive
    †   Protecting sensitive data is everyone’s responsibility, to increase awareness of careless online habits and assist in creating good practices ITS offer these security tips. Please contact the ITS security team at infosec@hawaii.e
  9. DMCA Takedown Procedures at UH
    A Digital Millennium Copyright Act (DMCA) infringement notice (also known as a DMCA takedown notice) is sent to the University when unauthorized copyrighted materials are found by copyright owners and/or their agents.  The takedown notice includ
  10. Phishing Attempt: You Have One New Message from hawaii.edu
    Sample Phishing Message:   "VIEW MESSAGE" <"http://www.disfracescarrousel.com.ar/plugins/user=/authn.hawaii.edu.html"> Copyright © 2012 Unauthorized access is prohibited by law in accordance with Chapter
  11. ITS Data Backup Policy
      The following information is provided to help users of Information Technology Services (ITS) systems understand the nature of the ITS backup procedures and the availability of information beyond the date on which it is deleted by the users.
  12. Network Etiquette
    Certain situations call for proper protocol to be observed. In bowling, one does not interrupt the person bowling in adjacent lanes by throwing the ball while they are already in the process of doing so. In tennis, returning a ball that is obviously
  13. List Owner's Responsibilities
    A list owner is entrusted with its members’ personal information (email address and name), and this carries certain responsibilities with regards to ensuring privacy and security. You must determine what level of security is most appropriate fo
  14. Securing your Computer & Protecting your Information
    [Print Friendly Version]   Use of all University of Hawaii information Technology Resources are governed by UH Executive Policy: E2.210 — Use and Management of Information Technology Resources.  Continued use of your UH Use
  15. Creating Personal Homepages
    Welcome to Creating Personal Homepages. One of the privileges of having a UH Username is that you are allowed to create a personal homepage in your account that is viewable to the world. PLEASE READ! Pages which include offensive images or sounds
  16. INFOBITS: Personal Webpage = Your Calling Card on the WWW
    by Justin Fung What is a personal webpage? A personal webpage, World Wide Web page, is created by an individual and contains content of a personal nature. Personal webpages can be as simple as plain text, similar to a Word document, or it can b
  17. Copyright in the Digital Age
    Intellectual property is the lifeblood of a university, and all members of the university community should respect the work of others inside and outside the academy. University of Hawaii Executive Policy E2.210: "Use and Management of Informatio
  18. ITS Computer Support Policy
    The Information Technology Services (ITS) Academic Technologies section provides technical support via email, telephone, and walk-in to UH faculty, staff and students systemwide through the ITS Help Desk. Contact the ITS Help Desk for support by ca
  19. IT POLICY: UH System Level Website Domain Names
    UH system level units and programs as well as multi-campus programs and initiatives may request a system level URL. All UH System URL requests will be categorized within a logical site structure, be it organizational (unit, department, office) or th
  20. IT Security @ UH
    General Information Getting your PC unblocked on the UH Network Password Guidelines Securely Deleting Electronic Information How to Securely Delete Electr
  21. IT POLICY: UH System Level Domain Names
    UH system level units and programs as well as multi-campus programs and initiatives may request a system level domain name in the form: program.hawaii.edu All other units, programs and initiatives must create their subdomain in their respective c
  22. What happens to my UH Username when I graduate or leave UH?
    Students, Non-retiring Faculty and Staff, and UH Affiliates Students who are not registered for classes for consecutive (Fall, Spring) semesters, Faculty and Staff who leave UH, but are not retiring, and UH Affiliates whose affiliations expire, tran
  23. What happens to my UH Email Account when I graduate or leave UH?
    Students, Non-retiring Faculty and Staff, and UH Affiliates Students who are not registered for classes for consecutive (Fall, Spring) semesters, Faculty and Staff who leave UH, but are not retiring, and UH Affiliates whose affiliations expire, tran
  24. UH staff: How do I get my UH Username?
    You may request your UH Username online from the UH Account Management page by clicking on the "Get a UH Username!" link. Your account should be ready within six (6) minutes. Most services, such as the SECE, will be available to you once yo
  25. UH ITS SurveyShare
    UH SurveyShare √ SurveyShare Features √ Request a SurveyShare Account √ Institutional Review Board √ Broadcasting √ Frequently Asked Questions (FAQ's) √ Resources √ Contact Information The Universit
  26. Faculty: How do I get my UH Username?
    You may request your UH Username online from the UH Account Management page by clicking on the "Get a UH Username!" link. Your account should be ready within six minutes. Most services, such as MyUH, will be available to you once your accou
  27. Student: How do I get my UH Username?
    You may request your UH Username online from the UH Account Management page by clicking on the "Get a UH Username!" link. Your account should be ready within six minutes. Most services, such as MyUH, will be available to you once your accou
  28. Open Source Software Alternatives
    This is a brief list of open source software alternatives for paid consumer software suites and applications. The information is provided for convenience and does not implicitly or explicitly constitute an endorsement or recommendation for any of the
  29. Sensitive Information Paper Document Disposal
    Sensitive information is defined in UH Policy E2.214 and includes information like social security number, student records, health information, personal financial information, drivers license numbers, etc. www.hawaii.edu/apis/ep/e2/e2214.pdf. &n
  30. UH POLICY: Non-EDU Domain Names on UH Network
    University of Hawaii units are expected to use a hawaii.edu domain name for all services provided through the UH network.  This makes it clear that the University is providing the resources to support the service.  Non-University activities
  31. IT Policy and Guidelines: UH Manoa Wireless Networks
    As with all shared resources of the University, policies and guidelines are established to ensure equitable and reliable access to limited resources for all members of the University community. The UH Manoa network infrastructure is considered to
  32. How do I add LDAP authentication for Mac OS X 10.7?
    It is possible to configure your client Mac OS X computer to authenticate against the UH LDAP server. Follow the steps below to setup LDAP authentication. This document will be limited in scope to just accomplishing the authentication process. It w
  33. Sample Copyright Notification Letter
    (Click here for PDF version of this form.) @font-face { font-family: "Arial"; }@font-face { font-family: "Times"; }@font-face { font-family: "ArialMT"; }p.MsoNormal, li.MsoNormal, div.MsoNormal { margin: 0in 0in 0.0001pt; font-size: 12
  34. Protecting Sensitive Information at UH
    The University of Hawaii (UH) is committed to protecting the personal, confidential information that it is entrusted with.  Beginning in 2004, UH has implemented the UH Number as a unique, personal identifier as a replacement for Social Security
  35. Personal Home Page Policies
    The server that the UH Personal Home Pages resides on is administered by Information Technology Services (ITS) and is intended to allow faculty, staff, and students space to create personal home pages. We wish to retain the ability to publish pages f
  36. Frequently Asked Questions about the UH Server Registration & Scanning Requirements
    Q.  Why am I required to register and scan my servers? A.  As a result of the recent data breaches, the University of Hawaii is implementing a new, systemwide Information Security Program to better protect the university's sensitive inform
  37. UH affiliate: How do I get my UH Username?
    Before you can get your UH Username from the online request system, ITS requires a memo from your sponsoring UH department or office on departmental letterhead identifying you and officially requesting that you have access to UH services and resource
  38. Security (or lack of it) on the Internet
    The modern age of surfing the internet has produced many ways for unwanted email (spam) to get to you. Some are annoying by sending you unwanted information about a product being sold, but others more recently are highly invasive with potential of id
  39. Frequently Asked Questions
    Q: What is HITS? A: HITS stands for Hawaii Interactive Video Service. It is managed by Information Technology Services, Academic Technologies division.  HITS primary purpose is to provide 2-way audio and video delivery of ITV classes within
  40. Password Guidelines
    The days of using simple words, a single character, or a blank password are gone. Today, easy passwords can be cracked or guessed within hours or even minutes. Since the information on your computer is precious and potentially confidential, you need
  41. RACF Password Reset SOP
    This is the standard operating procedure for RACF password resets.  Customer specific information is displayed in a brown font for quick reference.  The entire workflow and related information are also provided in order to help ensure that
  42. Securing Network Printers and Multi-Function Devices
    Network Printers and Multi-Function Devices (MFD) are common in offices because they provide the ability to copy, print, scan, and fax from one central machine that is shared by many. The MFD's typically store information and are connected to the ne