Page 58 • (12,693 results in 0.03 seconds)

  • 1. These guidelines are intended to provide employees, who are authorized to travel on behalf of the university, with adequate means of transportation, lodging, meals and other services necessary to

    The following policy has been established to provide guidance on the use of the University’s resources to pay (either through reimbursement, advance or P-Card charge) travel and entertainment expenses incurred by PLU employees while conducting University business. The purpose is to help the university effectively monitor and control costs, and to adequately comply with the accountable plan rules set forth by the Internal Revenue Service (IRS). (For specific requirements imposed by the IRS for

  • Information & Technology Services has transitioned to a new system for installing Windows updates on University owned computers.

    PLU Computer Patch Management and Windows Updates Information & Technology Services has transitioned to a new system for installing Windows updates on University owned computers.  The updates, which had been distributed using a program called Lumension (also known as Patchlink), will now be remotely pushed out through a Microsoft product that is tightly integrated into the Windows operating system.  When updates are available for your computer, they will be downloaded in the background while

  • Access the online Help Desk service request system. You'll need an active PLU ePass to log in.

    Internet, Wireless and Phone Service Internet Access – Getting connected to the PLU internet. Finding the Jack Number on a Wall Plate – Getting the wall plate and jack number for a service request. Phones – Overview of PLU campus phone system. Phone Prefixes – Find the prefix for four-digit extensions at PLU. PLU Voicemail – Basic guide to using voice mail with PLU digital phones. Phone Service and Repair – Getting support with your digital phone. Service RequestsAccess the online Help Desk

  • by David Domask Example of phishing email (click to enlarge) Yet another round of fraudulent “phishing” emails have been sent across Campus masquerading as an official email warning users that their accounts are about to be shut down unless they are verified. As we have noted…

    Fraudulent Email and Phishing Redux Posted by: Jenna S / February 9, 2016 February 9, 2016 by David Domask Example of phishing email (click to enlarge) Yet another round of fraudulent “phishing” emails have been sent across Campus masquerading as an official email warning users that their accounts are about to be shut down unless they are verified. As we have noted multiple times during these campaigns, the Help Desk will never solicit your account information. All of our account work is done

  • Pacific Lutheran University provides information technology (IT) services in support of the university’s educational mission. IT services include but are not limited to computer labs, data and voice networks, classroom and instructional technologies, and administrative systems. Policies related to IT services and resources extend also to copyright infringement, intellectual property, content accessed or downloaded over...

    Pacific Lutheran University provides information technology (IT) services in support of the university’s educational mission. IT services include but are not limited to computer labs, data and voice networks, classroom and instructional technologies, and administrative systems. Policies related to IT services and resources extend also to copyright infringement, intellectual property, content accessed or downloaded over the PLU network, and appropriate use of communication systems & services

  • Individual responsibility is a key attribute of a vibrant learning community. All students, faculty, and staff are therefore expected to respect the needs and rights of others by exercising good judgment in their use of technology. Hallmarks of individual responsibility within an electronic environment include respect for the intellectual property of others, adherence to standards...

    Individual responsibility is a key attribute of a vibrant learning community. All students, faculty, and staff are therefore expected to respect the needs and rights of others by exercising good judgment in their use of technology. Hallmarks of individual responsibility within an electronic environment include respect for the intellectual property of others, adherence to standards for academic integrity, maintenance of learning and working environments that are free from materials that may

  • 3.3.1 Authentication and Identity Management PLU issues and manages electronic identifiers — e.g. ePass usernames and passwords — for every member of the university who connects to the network to use such electronic resources as email, online resources, administrative information systems, and learning management systems. All users of the PLU network must obtain electronic identifiers...

    3.3.1 Authentication and Identity Management PLU issues and manages electronic identifiers — e.g. ePass usernames and passwords — for every member of the university who connects to the network to use such electronic resources as email, online resources, administrative information systems, and learning management systems. All users of the PLU network must obtain electronic identifiers to gain access to the network and to specific networked resources to which they are assigned access. Users must

  • The University recognizes that the value of its data and resources lie in their appropriate and widespread use. Pacific Lutheran University is committed to respect and protect the privacy of its students, employees, parents, alumni, friends and healthcare patients as well as to protect the confidentiality of information important to the University’s academic mission. A...

    The University recognizes that the value of its data and resources lie in their appropriate and widespread use. Pacific Lutheran University is committed to respect and protect the privacy of its students, employees, parents, alumni, friends and healthcare patients as well as to protect the confidentiality of information important to the University’s academic mission. A data classification policy is necessary to provide a framework for securing data from risks including but not limited to

  • A breach in the security of restricted data can lead to identity theft, legal action against the university, or other great harm to the university or members of the PLU community. While data security policies are designed to minimize the risk of such breaches, incident management and response policies must also be in place to...

    A breach in the security of restricted data can lead to identity theft, legal action against the university, or other great harm to the university or members of the PLU community. While data security policies are designed to minimize the risk of such breaches, incident management and response policies must also be in place to guide institutional response if/when breaches do occur. For the purposes of this policy, an incident is an event that threatens the integrity of PLU data or the

  • Alumni can check out up to 15 items at a time.  Alumni Cards can be obtained from Alumni & Student Connections.

    The Mortvedt Library welcomes visitors from the general public and alumni. See our policy concerning non-PLU patrons and visitors under the age of 18. Available: library computers online database and journal access (on campus only – why?) printing and copying wireless Internet access Not available: off campus access to electronic resources study rooms interlibrary loan AlumniAlumni can check out up to 15 items at a time.  Alumni Cards can be obtained from Alumni & Student Connections. Item Type