-
Frequently Asked Questions
- Adding a Profile Picture
- Aruba 503H Wireless Access Point
- Classroom Technology – Frequently Asked Questions
- Controlling Camera in a Partially Upgraded Classroom
- Controlling Cameras in a Fully Upgraded Classroom
- New Updates to Mac AirPlay now Screen Mirroring on macOS Big
- Online Learning/Streaming Classroom Remote
- Partial and Full Classroom Upgrade Media Setup for Microsoft Teams
- Portable Classroom Media Setup for Microsoft Teams
- Use Apple TV in a Classroom
- Using Teams in the Streaming Classrooms
- Video Conferencing Classroom Technology
- What is Apple TV
-
Policies and Procedures
- Acceptable Use of Electronic Content
- Access to electronic content of deceased or incapacitated students, employees, and retirees
- Administrative Data Access Policy
- Administrative ERP Program Change Procedures
- Administrative ERP User Access Policy
- Affiliate Member Access & Services Request
- College of Wooster Privacy Statement: General Statement of our practices and policies
- College Technology Purchases
- Copyright Infringement Policies Procedures Sanctions
- Disposition of Used Computer Equipment
- Email Distribution List Use ("ZWD lists")
- GDPR Privacy Statement
- Guest Wireless Acceptable Use Policy
- Higher Education Opportunity Act of 2008 Compliance Plan
- InCommon Federation Participant Operational Practices
- Information Technology Policies and Procedures
- Investigations Requesting Information from IT Systems & Applications
- IT Maintenance Window
- Repair Policy Change Proposal – April 2016
- Requests for Student Information
- Safeguarding Individual Information (GLBA "Safeguards Rule")
- Technology equipment and software: how to get/fix/replace and your responsibilities for it
- The California Consumer Privacy Act
- The College of Wooster ERP Data Stewardship
- User Responsibilities and Appropriate Use Principles
- Wireless Handheld Device Allowance
- Wireless Handheld Device Allowance Request
- Wireless Networking Policy
- Show all articles ( 13 ) Collapse Articles
-
Students
-
Employees
-
Connecting to the Network
-
Software
-
- Access Your College of Wooster LinkedIn Learning Account and Connect a LinkedIn Profile
- ArcGIS Access
- Available Software
- Downloads
- Evernote
- Google Cardboard
- Google Earth and Other GIS Programs
- iMovie for Students
- Installing Maple for OS X
- Installing Maple for Windows
- Installing SALT Windows
- Keynote for Students
- Matlab
- Microsoft 365 Licensing and Email after Graduation
- Navigate the LinkedIn Learning Interface
- Omeka
- Open Source Video Editing Software
- Pages for Students
- PDF Creation for Students
- Photos
- Photoshop for Students
- Qualtrics
- RAVE Guardian
- RAWGraphs
- Remote Desktop Access Mac
- Remote Desktop Access PC
- Screen Recording
- SPSS
- Stata
- Tagging and Bookmarking
- Trint
- Video Project Workshop Outline
- Voyant Tools – Free Textual Analysis
- What Technology Do I Need at Wooster?
- What to expect as a class observer
- Wolfram Mathematica @ The College of Wooster
- Zap Works Designer
- Zotero
- Show all articles ( 24 ) Collapse Articles
-
- Access Your College of Wooster LinkedIn Learning Account and Connect a LinkedIn Profile
- Adobe Premiere Pro
- ArcGIS Access
- ARTstor
- Available Software
- BrightLink Projectors for Teaching
- Changing your Apple ID
- Connect to Network Storage and Services from OFF Campus
- Creating Informer Reports
- Downloads
- Google Cardboard
- Google Earth and Other GIS Programs
- iMovie for Teaching
- Informer Reporting
- Installing Maple for Windows
- Installing SALT Windows
- Keynote for Teaching
- Keynote Toolbar Items
- Matlab
- Navigate the LinkedIn Learning Interface
- Omeka
- Open Source Video Editing Software
- Pages for Teaching
- Photos
- Qualtrics
- Qualtrics
- Quantitative Literacy Resources
- RAVE Guardian
- RAWGraphs
- Remote Desktop Access Mac
- Remote Desktop Access PC
- Resources for Class Projects
- Room Assignments File Format
- Screen Recording
- Select Survey Training Manual
- Select Survey User Manual
- Software & Applications Requiring VPN
- SPSS
- Stata
- Tagging and Bookmarking
- Trint
- Video Project Workshop Outline
- Voyant Tools – Free Textual Analysis
- What to expect as a class observer
- Wolfram Mathematica @ The College of Wooster
- Zap Works Designer
- Zotero
- Show all articles ( 33 ) Collapse Articles
-
- Access Your College of Wooster LinkedIn Learning Account and Connect a LinkedIn Profile
- Adobe Premiere Pro
- Available Software
- BrightLink Projectors for Teaching
- Changing your Apple ID
- Connect to Network Storage and Services from OFF Campus
- Creating Informer Reports
- Downloads
- iMovie for Teaching
- Informer Reporting
- Installing Maple for OS X
- Keynote for Teaching
- Navigate the LinkedIn Learning Interface
- Pages for Teaching
- Qualtrics
- Qualtrics
- Quantitative Literacy Resources
- RAVE Guardian
- Room Assignments File Format
- Select Survey Training Manual
- Select Survey User Manual
- Software & Applications Requiring VPN
- Tagging and Bookmarking
- Zotero
- Show all articles ( 9 ) Collapse Articles
-
- ARTstor
- Audacity
- Breaking Language Barriers with Google Translate and AR
- Clipchamp video editor
- Concept Mapping
- Coolors.co
- GarageBand
- Garageband
- Google Cardboard
- iMovie
- Machinima
- Photos
- Photoshop
- Pixabay royalty free photos and videos
- Podcasting Tools
- QuickTime Player
- Screen Recording
- SketchUp
- Storyboarding
- Timeline tools
- Video Project Resources
- Windows Story Remix
- Zap Works Designer
- Show all articles ( 8 ) Collapse Articles
-
- Administrative ERP Program Change Procedures
- Administrative ERP User Access Policy
- Colleague Access Request Form
- Colleague Detailed User Guide
- Colleague UI 5 – Differences from the old version UI 4
- Creating Informer Reports
- Datatel Colleague Learning Guide Basic Navigation – Purchasing
- Datatel Colleague Navigation Keyboard Shortcuts
- Ellucian (Colleague)
- Ellucian (Datatel)
- Informer Reporting
- Name Computed Columns
- Other Datatel related forms
- Purchasing Documentation
- Room Assignments File Format
- The College of Wooster ERP Data Stewardship
- Using Select / Returning Criteria
- Show all articles ( 2 ) Collapse Articles
-
-
Printing
-
Loanable Technology
-
- Canon E05 Rebel DSLR
- Canon Vixia HF R800 HD Camcorder
- Canon Vixia Video Camera
- Conference Kit
- GoPro as a Webcam
- GoPro Hero 8 Black
- GoPro Kit
- Logitech ConferenceCam
- Logitech Webcam C930e
- Mi Sphere Camera Kit
- Overhead Document Cameras
- Portable Classroom
- Rylo 360 Camera
- Tabletop Document Cameras
- Video Adapters
- Video Chat Kit
- Show all articles ( 1 ) Collapse Articles
-
-
Microsoft 365
-
- Calendar Sharing
- Check Junk Mail
- Creating an Inbox Folder and a Rule within Outlook
- Email Distribution List Use ("ZWD lists")
- Email Setup on a Mobile Device
- Email Troubleshooting
- Forward/Redirecting your email
- Installing FindTime
- Make Outlook your default email client
- Managing Junk E-Mail
- Managing your Office 365 Quarantine
- Microsoft 365 Licensing and Email after Graduation
- Microsoft Outlook
- Missing an Email?
- New Email Accounts
- Outlook Basics
- Outlook open another mailbox
- Set up an email account in Outlook
- Using Office 365 Groups
- Using Quick Steps
- Wooster Email
- Wooster’s External Email Alert Indicators
- Show all articles ( 8 ) Collapse Articles
-
- Conducting class if you or some of your students are participating remotely
- Conducting interviews and campus talks/teaching demos with remote candidates
- Getting to know Microsoft Teams
- GoPro as a Webcam
- Making Meetings with Microsoft Teams
- Microsoft Teams Information
- Microsoft Teams Live Events
- New Recording Storage Location on Teams WITHOUT Recording Ready Email
- Online Learning/Streaming Classroom Remote
- Online Meeting
- Partial and Full Classroom Upgrade Media Setup for Microsoft Teams
- Participating in a meeting as a Guest
- Portable Classroom Media Setup for Microsoft Teams
- Scheduling a Teams Meeting
- Sharing Content in a Microsoft Teams Meeting
- Teams & Zoom comparison
- Teams Meet Now
- Teams Meeting Breakout Rooms
- Using a Scheduled Meeting
- Using Closed Captioning Within Teams
- Using Teams in the Streaming Classrooms
- Video Conferencing Classroom Technology
- Video Conferencing with The College of Wooster
- Show all articles ( 8 ) Collapse Articles
-
-
Moodle
-
Network, Cybersecurity, and Best Practices
- Encrypting Devices
- Encrypting Mac Systems
- Encrypting Mobile Devices & Tablets
- Encrypting Windows Systems
- Information & Cyber Security @ Wooster
- Protect Your Computer
- Protecting your Personal Network
- Removing VPN From your Mac
- Safeguarding Individual Information ("Red Flags", "Identity Theft")
- Securing Portable and Mobile Devices
- VPN – Mac OS 10.13 or Later
- VPN – Mobile Devices and Chromebooks
- VPN – Windows
- Wooster’s External Email Alert Indicators
-
Multi-Factor Identification (MFA)
- Change Your Password
- Changing Your Mac Password While Off Campus
- Forgotten Passwords
- How to setup MFA (Multi-Factor Authentication)
- Multifactor Authentication Instructions for using wireless networking when phone service is not available
- Multifactor authentication while out of the US.
- Password changes
- Password Policy
-
College of Wooster Password
-
Phones and Conference calls
-
Scanning
-
Resources for Retirees
-
Using the Self-Service Portal for Equipment Reservation
-
Online File Storage Options
-
Computer Lab
-
Classroom Controls
-
Classroom Setup
-
Classroom Resources
-
Classroom Troubleshooting
Investigations Requesting Information from IT Systems & Applications
Guiding Principles for Our Work:
- We (IT) will respect the confidentiality, integrity, and security of the information contained in the electronic communications, records, and applications we manage directly. Given this, division leadership, in particular, the CIPO, is required to carefully guide the selection and stewardship of the College’s information systems with particular attention to protecting individual privacy and rights as members of the College community.
- We will not monitor or review individual users’ content unless directed as noted here.
- We will monitor the systems we manage directly for performance. As needed, we may need to address malware, viruses, or other issues that will impact the performance and security of College systems, and in that process, we may need to review – and remove – impacted files.
- Unless an investigation involves an incident that may have resulted from the functioning of IT systems, we will not expand the scope of our investigatory work beyond the specific information requested. Our investigations into the functioning of IT systems will be guided by best practices in the IT systems and security field.
- Should we support an investigation requiring examination of IT-stewarded resources, we will hold the process, information, and resulting findings in strictest confidence.
- We will encourage full transparency of the investigation and our process with those whose information may be accessed unless such will jeopardize the investigation.
IT will support investigations that:
- Respond to a subpoena
- Authorization by College’s legal counsel required
- Involve an alleged violation of law
- Authorization by either Security & Protective Services as the liaison to law enforcement or the College’s attorneys required
- Involve a legal claim either against the College or against a member of the College community who is defended by College legal counsel
- Authorization by College’s legal counsel required
- Involve an alleged violation of College policy
- Authorization is through Human Resources in the case of an allegation involving a current or former College employee
- Authorization is through Student Affairs in the case of an allegation involving a current or former College student
Procedure & Release of Findings
The procedure(s) we use when an investigation is undertaken depends on the nature and scope of the request. There will be times when we will not be able to fully assist with an investigation or request, for example, when systems are outside IT’s direct management (e.g., 3rd party managed applications, social media sites).
What we do and what information is released depends on what content is requested, the format of storage, whether IT has access to the information (for example, 3rd party managed applications require the investigation be conducted by the 3rd party provider), and the specificity of the request. We consider and we ask requestors to consider and document in their request:
- Is the request required by and consistent with law or in response to a lawful demand?
- Is there a demonstrated reason to believe that violation of law may have occurred?
- Is there a demonstrated reason to believe that violation of College policy may have occurred?
- Is there a life or safety emergency?
- Is there a compelling circumstance, including substantial risk of harm or liability to the College or a member of the College community?
- Is the information essential to maintain the normal operation of the College?
- Is the information essential to meeting a time-dependent, critical operational circumstance, including external or regulatory audit requirements?
Responsibilities within IT
The CIPO has responsibility for fulfilling the request with assistance of IT staff, denying the request, or conferring on the request as needed with appropriate senior staff, the President, or/and College legal counsel as appropriate.
Internal Documentation
IT will fully document the request, including written documentation provided by requestor(s), and will maintain a secure repository of such requests, documentation, communications, data, and reports.
Ed: 11 January 2021