Technology Digest: August 22, 2013

Welcome to a new academic year, Pirates!

GETTING STARTED:           [
NEW FACULTY AND STAFF]          [NEW STUDENTS]
 

In this edition:
·         Using ECU information technology resources  responsibly
·         Technology help resources
·         Check out the updated ITCS Web site!
·         Read&Write GOLD software for students
     
·         Mobile computing security tips
·         How to report spam and phishing messages
at ECU
·         ECU social media regulation and guidelines
 
Using ECU information technology resources responsibly

By using university IT resources, you are accepting that you are accessing the university-owned network, and that unauthorized or illegal use of the university network is prohibited. You are attesting that you will comply with university IT policies including, but not limited to, university information technology (IT) policies located at www.ecu.edu/cs-itcs/policies, the University Student and Employee Computer Use Policy at http://www.ecu.edu/cs-itcs/policies/staffstudentpolicy.cfm and Academic Computer Use Policy at http://www.ecu.edu/cs-itcs/policies/academicpolicy.cfm.
 
All users of university IT resources are reminded that copyright infringement is the act of exercising, without permission or legal authority, one or more of the exclusive rights granted to the copyright owner under section 106 of the Copyright Act (Title 17 of the United States Code). These rights include the right to reproduce or distribute a copyrighted work. In the file-sharing context, downloading or uploading substantial parts of a copyrighted work without authority constitutes an infringement.
 
Penalties for copyright infringement include civil and criminal penalties. In general, anyone found liable for civil copyright infringement may be ordered to pay either actual damages or “statutory” damages affixed at not less than $750 and not more than $30,000 per work infringed. For “willful” infringement, a court may award up to $150,000 per work infringed. A court can, in its discretion, also assess costs and attorneys’ fees. For details, see Title 17, United States Code, Sections 504, 505.
 
Willful copyright infringement can also result in criminal penalties, including imprisonment of up to five years and fines of up to $250,000 per offense.
 
For more information, please see the Web site of the U.S. Copyright Office at www.copyright.gov, especially their FAQ’s at www.copyright.gov/help/faq.
 
 
University employees who violate university computer-use policies will be subject to disciplinary action as governed by policy. Student violations are misconduct under the applicable student disciplinary code. Sanctions may include revocation of access privileges in addition to other sanctions available under the regular disciplinary procedures.  
Technology help resources
 
Reach the ECU IT Help Desk at 252.328.9866 (toll free 800.340.7081) or help.ecu.edu.
 
Visit our Mac Support Web site for help on Mac operating systems, security, and other Apple products:http://www.ecu.edu/itcs/mac/index.cfm.
 
Contact the ACE Student Computer Support Center on Main Campus (108 Rawl, 252.328.5407) or Health Sciences Campus (3330 Health Sciences Building, 252.744.5380).
 
 
Check out the updated ITCS Web site!
 
The ITCS Web site (www.ecu.edu/itcs) update touched all aspects of our site: new page design, organized and updated content, and intuitive navigation. Not only will you find updated information but also an interface that shows it to the best advantage.
 
With more information “above the fold,” there’s less scrolling, and a newer 960 pixel width page uses a responsive design style sheet, so mobile devices from smartphones to tablets, are better able to view a page’s information. The main pages also contain a new custom image element where news, projects and IT information is showcased.
 
Read&Write GOLD software for students
 
cid:image002.jpg@01CE9B27.D1129990
 
Read&Write GOLD is assistive technology software that reads electronic text from e-books, Web sites, and documents created in word-processing programs.
 
Read&Write Gold helps writers with predictive spelling, word choice, dictionary and thesaurus features.
 
The program includes voice dictation that also reads aloud what students write and helps them identify errors.
 
This software is available as a free download from the ECU Download Center (Classroom Tools).
 
For help using Read&Write GOLD, visit the Texthelp training guide page.
 
Mobile computing security tips
 
Mobile devices include but aren’t limited to cellular phones, BlackBerry devices, iPhones, Androids, Smartphones, iPads, tablets, and portable storage devices, such as flash drives. Most of these devices are used to perform multiple tasks such as placing voice calls, sending text messages and e-mail, surfing the Internet, and debit/credit card transactions. A significant amount of personal and work-related information is stored or accessed via mobile devices, which makes them just as powerful as desktop or laptop computers. The increased productivity is great, but mobile devices are subject to an increased risk of loss, theft, and unauthorized use.
 
What are the threats?
 
·         Exposure of confidential or sensitive information due to –
-          Connectivity to unsecured public networks
-          Storage of data in an unsafe manner
-          Transmission of data in an unsafe manner
·         Lost or stolen devices
·         Mobile and e-mail viruses
·         Spam
 
What can YOU do to secure your mobile devices?
 
·         Keep your mobile device physically secure.
·         If your device is lost, report it immediately to your carrier or organization.
·         Control what data is stored on the device. Do not store unnecessary or sensitive information.
·         Enable storage encryption.
·         Use a secure password or PIN to access your device.
·         Disable features and services that are not needed (e.g. Bluetooth, GPS, etc.).
·         If available, install firewall and anti-virus software.
·         Keep all software up-to-date.
·         Before disposing the device, be sure to wipe all data from it.
 
Bottom line: treat your mobile device as if it was cash!           

More information: ECU Smartphone Security Guidelines (pdf)
How to report spam and phishing messages at ECU

file:///C:/Users/rabyj/Desktop/ads/ReportSpamLCDborder.jpg
Learn how to protect yourself against SPAM and PHISHING: http://www.staysafeonline.org/stay-safe-online/keep-a-clean-machine/spam-and-phishing
ECU social media regulation and guidelines

While all ECU employees are welcome to participate in social media, we encourage everyone who participates in and contributes to online commentary to understand and follow the university’s social media regulation (html) and ECU’s social media guidelines (pdf).

Upcoming Training and Events
Check out our technology training calendar
From Blackboard to Lync to Saba Meeting (formerly Centra) – we’ve got something for everyone!
 
View all ITCS training at http://training.ecu.edu.
Be Sociable, Share!
  • Twitter
  • Facebook
  • email