Page 19 • (12,617 results in 0.023 seconds)

  • Migration, colonial occupation, refugee flows, global travel—the movement of people and ideas across national borders both historically and in the present has political, economic, social and

    Transnationalism and its ConsequencesMigration, colonial occupation, refugee flows, global travel—the movement of people and ideas across national borders both historically and in the present has political, economic, social and cultural impacts for the destination and also for the place of origin. Using multiple disciplinary perspectives, this concentration investigates the issues arising from the transnational movement of people and ideas such as those related to religious and cultural

  • by Damian Alessandro. The scope of human history is vast, encompassing everything that has happened in past societies. However, when most students think about history, they usually focus on the dates and events that have been highlighted in textbooks. These events tend to include social…

    Where History and Innovation Meet Posted by: halvormj / November 28, 2017 Image: Does innovation change the way that we see the world? Photo by Dayne Topkin on Unsplash. November 28, 2017 by Damian Alessandro. The scope of human history is vast, encompassing everything that has happened in past societies. However, when most students think about history, they usually focus on the dates and events that have been highlighted in textbooks. These events tend to include social upheavals and mass

  • by David Domask Example of phishing email (click to enlarge) Yet another round of fraudulent “phishing” emails have been sent across Campus masquerading as an official email warning users that their accounts are about to be shut down unless they are verified. As we have noted…

    Fraudulent Email and Phishing Redux Posted by: Jenna S / February 9, 2016 February 9, 2016 by David Domask Example of phishing email (click to enlarge) Yet another round of fraudulent “phishing” emails have been sent across Campus masquerading as an official email warning users that their accounts are about to be shut down unless they are verified. As we have noted multiple times during these campaigns, the Help Desk will never solicit your account information. All of our account work is done

  • Pacific Lutheran University provides information technology (IT) services in support of the university’s educational mission. IT services include but are not limited to computer labs, data and voice networks, classroom and instructional technologies, and administrative systems. Policies related to IT services and resources extend also to copyright infringement, intellectual property, content accessed or downloaded over...

    Pacific Lutheran University provides information technology (IT) services in support of the university’s educational mission. IT services include but are not limited to computer labs, data and voice networks, classroom and instructional technologies, and administrative systems. Policies related to IT services and resources extend also to copyright infringement, intellectual property, content accessed or downloaded over the PLU network, and appropriate use of communication systems & services

  • Individual responsibility is a key attribute of a vibrant learning community. All students, faculty, and staff are therefore expected to respect the needs and rights of others by exercising good judgment in their use of technology. Hallmarks of individual responsibility within an electronic environment include respect for the intellectual property of others, adherence to standards...

    Individual responsibility is a key attribute of a vibrant learning community. All students, faculty, and staff are therefore expected to respect the needs and rights of others by exercising good judgment in their use of technology. Hallmarks of individual responsibility within an electronic environment include respect for the intellectual property of others, adherence to standards for academic integrity, maintenance of learning and working environments that are free from materials that may

  • 3.3.1 Authentication and Identity Management PLU issues and manages electronic identifiers — e.g. ePass usernames and passwords — for every member of the university who connects to the network to use such electronic resources as email, online resources, administrative information systems, and learning management systems. All users of the PLU network must obtain electronic identifiers...

    3.3.1 Authentication and Identity Management PLU issues and manages electronic identifiers — e.g. ePass usernames and passwords — for every member of the university who connects to the network to use such electronic resources as email, online resources, administrative information systems, and learning management systems. All users of the PLU network must obtain electronic identifiers to gain access to the network and to specific networked resources to which they are assigned access. Users must

  • The University recognizes that the value of its data and resources lie in their appropriate and widespread use. Pacific Lutheran University is committed to respect and protect the privacy of its students, employees, parents, alumni, friends and healthcare patients as well as to protect the confidentiality of information important to the University’s academic mission. A...

    The University recognizes that the value of its data and resources lie in their appropriate and widespread use. Pacific Lutheran University is committed to respect and protect the privacy of its students, employees, parents, alumni, friends and healthcare patients as well as to protect the confidentiality of information important to the University’s academic mission. A data classification policy is necessary to provide a framework for securing data from risks including but not limited to

  • A breach in the security of restricted data can lead to identity theft, legal action against the university, or other great harm to the university or members of the PLU community. While data security policies are designed to minimize the risk of such breaches, incident management and response policies must also be in place to...

    A breach in the security of restricted data can lead to identity theft, legal action against the university, or other great harm to the university or members of the PLU community. While data security policies are designed to minimize the risk of such breaches, incident management and response policies must also be in place to guide institutional response if/when breaches do occur. For the purposes of this policy, an incident is an event that threatens the integrity of PLU data or the

  • Alumni can check out up to 15 items at a time.  Alumni Cards can be obtained from Alumni & Student Connections.

    The Mortvedt Library welcomes visitors from the general public and alumni. See our policy concerning non-PLU patrons and visitors under the age of 18. Available: library computers online database and journal access (on campus only – why?) printing and copying wireless Internet access Not available: off campus access to electronic resources study rooms interlibrary loan AlumniAlumni can check out up to 15 items at a time.  Alumni Cards can be obtained from Alumni & Student Connections. Item Type

  • 2021 - Living with Mortality: Illness, Trauma, Joy and Hope 2020 - Dear Church: A Love Letter from a Black Preacher to the Whitest Denomination in the US 2019 - Naked and Unashamed (Gen 2:25): Sex,

    The annual Lutheran Studies Conference provides an opportunity for the university, the larger community, and persons from diverse religious and humanistic viewpoints to explore particular and pressing issues within the thoughtful and generous milieu of Lutheran higher education. Each conference welcomes scholars, artists, and religious leaders whose expertise is offered in an engaging and thought-provoking manner. As a university of the church, PLU promotes the 500 year Lutheran tradition of