Technology Digest: August 22, 2013

Welcome to a new academic year, Pirates!

GETTING STARTED:           [

In this edition:
·         Using ECU information technology resources  responsibly
·         Technology help resources
·         Check out the updated ITCS Web site!
·         Read&Write GOLD software for students
·         Mobile computing security tips
·         How to report spam and phishing messages
at ECU
·         ECU social media regulation and guidelines
Using ECU information technology resources responsibly

By using university IT resources, you are accepting that you are accessing the university-owned network, and that unauthorized or illegal use of the university network is prohibited. You are attesting that you will comply with university IT policies including, but not limited to, university information technology (IT) policies located at, the University Student and Employee Computer Use Policy at and Academic Computer Use Policy at
All users of university IT resources are reminded that copyright infringement is the act of exercising, without permission or legal authority, one or more of the exclusive rights granted to the copyright owner under section 106 of the Copyright Act (Title 17 of the United States Code). These rights include the right to reproduce or distribute a copyrighted work. In the file-sharing context, downloading or uploading substantial parts of a copyrighted work without authority constitutes an infringement.
Penalties for copyright infringement include civil and criminal penalties. In general, anyone found liable for civil copyright infringement may be ordered to pay either actual damages or “statutory” damages affixed at not less than $750 and not more than $30,000 per work infringed. For “willful” infringement, a court may award up to $150,000 per work infringed. A court can, in its discretion, also assess costs and attorneys’ fees. For details, see Title 17, United States Code, Sections 504, 505.
Willful copyright infringement can also result in criminal penalties, including imprisonment of up to five years and fines of up to $250,000 per offense.
For more information, please see the Web site of the U.S. Copyright Office at, especially their FAQ’s at
University employees who violate university computer-use policies will be subject to disciplinary action as governed by policy. Student violations are misconduct under the applicable student disciplinary code. Sanctions may include revocation of access privileges in addition to other sanctions available under the regular disciplinary procedures.  
Technology help resources
Reach the ECU IT Help Desk at 252.328.9866 (toll free 800.340.7081) or
Visit our Mac Support Web site for help on Mac operating systems, security, and other Apple products:
Contact the ACE Student Computer Support Center on Main Campus (108 Rawl, 252.328.5407) or Health Sciences Campus (3330 Health Sciences Building, 252.744.5380).
Check out the updated ITCS Web site!
The ITCS Web site ( update touched all aspects of our site: new page design, organized and updated content, and intuitive navigation. Not only will you find updated information but also an interface that shows it to the best advantage.
With more information “above the fold,” there’s less scrolling, and a newer 960 pixel width page uses a responsive design style sheet, so mobile devices from smartphones to tablets, are better able to view a page’s information. The main pages also contain a new custom image element where news, projects and IT information is showcased.
Read&Write GOLD software for students
Read&Write GOLD is assistive technology software that reads electronic text from e-books, Web sites, and documents created in word-processing programs.
Read&Write Gold helps writers with predictive spelling, word choice, dictionary and thesaurus features.
The program includes voice dictation that also reads aloud what students write and helps them identify errors.
This software is available as a free download from the ECU Download Center (Classroom Tools).
For help using Read&Write GOLD, visit the Texthelp training guide page.
Mobile computing security tips
Mobile devices include but aren’t limited to cellular phones, BlackBerry devices, iPhones, Androids, Smartphones, iPads, tablets, and portable storage devices, such as flash drives. Most of these devices are used to perform multiple tasks such as placing voice calls, sending text messages and e-mail, surfing the Internet, and debit/credit card transactions. A significant amount of personal and work-related information is stored or accessed via mobile devices, which makes them just as powerful as desktop or laptop computers. The increased productivity is great, but mobile devices are subject to an increased risk of loss, theft, and unauthorized use.
What are the threats?
·         Exposure of confidential or sensitive information due to –
–          Connectivity to unsecured public networks
–          Storage of data in an unsafe manner
–          Transmission of data in an unsafe manner
·         Lost or stolen devices
·         Mobile and e-mail viruses
·         Spam
What can YOU do to secure your mobile devices?
·         Keep your mobile device physically secure.
·         If your device is lost, report it immediately to your carrier or organization.
·         Control what data is stored on the device. Do not store unnecessary or sensitive information.
·         Enable storage encryption.
·         Use a secure password or PIN to access your device.
·         Disable features and services that are not needed (e.g. Bluetooth, GPS, etc.).
·         If available, install firewall and anti-virus software.
·         Keep all software up-to-date.
·         Before disposing the device, be sure to wipe all data from it.
Bottom line: treat your mobile device as if it was cash!           

More information: ECU Smartphone Security Guidelines (pdf)
How to report spam and phishing messages at ECU

Learn how to protect yourself against SPAM and PHISHING:
ECU social media regulation and guidelines

While all ECU employees are welcome to participate in social media, we encourage everyone who participates in and contributes to online commentary to understand and follow the university’s social media regulation (html) and ECU’s social media guidelines (pdf).

Upcoming Training and Events
Check out our technology training calendar
From Blackboard to Lync to Saba Meeting (formerly Centra) – we’ve got something for everyone!
View all ITCS training at

Technology Digest: August 15, 2013

ECU Faculty:
Information Technology and Computing Services (ITCS) would like to invite you to use ECU Oxygen file storage! 
ECU Oxygen gives you the ability to sync files between your devices and encrypts files for added security. Your personal Oxygen space has been set at 10GB. 
ECU Oxygen is not intended to be a replacement for Piratedrive; this new file storage service is in addition to your Piratedrive space.

At this time, Oxygen is NOT approved for storing sensitive data; please refer to FERPAHIPAA, and PHI guidelines.

You can begin using ECU Oxygen by clicking the link below and registering as a ‘New User’. You will be prompted for an OxygenID (please use your FULL E-MAIL ADDRESS ( when prompted for your OxygenID.) After the Oxygen login, enter your INTRA login (without @ECU.EDU) and INTRA password. Then, enter your first and last name.
After you successfully register, you will be required to install software for the operating system/device you are using, whether it is Windows, Mac, iPad, iPhone or Android. You will be directed to the relevant page for the software  download.
Please contact the IT Help Desk at 252.328.9866 or with any issues registering your account or accessing ECU Oxygen.
Watch the Oxygen Cloud – Getting Started for Users video on YouTube:
Attend a training session:

September 11 – 2:00-3:00pm
September 17 – 3:00-4:00pm
October 1 – 2:00-3:00pm
October 9 – 1:00-2:00pm
Learn about Piratedrive, SharePoint collaborative space, Microsoft Lync and more: