-
Frequently Asked Questions
- Adding a Profile Picture
- Aruba 503H Wireless Access Point
- Classroom Technology – Frequently Asked Questions
- Controlling Camera in a Partially Upgraded Classroom
- Controlling Cameras in a Fully Upgraded Classroom
- New Updates to Mac AirPlay now Screen Mirroring on macOS Big
- Online Learning/Streaming Classroom Remote
- Partial and Full Classroom Upgrade Media Setup for Microsoft Teams
- Portable Classroom Media Setup for Microsoft Teams
- Use Apple TV in a Classroom
- Using Teams in the Streaming Classrooms
- Video Conferencing Classroom Technology
- What is Apple TV
-
Policies and Procedures
- Acceptable Use of Electronic Content
- Access to electronic content of deceased or incapacitated students, employees, and retirees
- Administrative Data Access Policy
- Administrative ERP Program Change Procedures
- Administrative ERP User Access Policy
- Affiliate Member Access & Services Request
- College of Wooster Privacy Statement: General Statement of our practices and policies
- College Technology Purchases
- Copyright Infringement Policies Procedures Sanctions
- Disposition of Used Computer Equipment
- Email Distribution List Use ("ZWD lists")
- GDPR Privacy Statement
- Guest Wireless Acceptable Use Policy
- Higher Education Opportunity Act of 2008 Compliance Plan
- InCommon Federation Participant Operational Practices
- Information Technology Policies and Procedures
- Investigations Requesting Information from IT Systems & Applications
- IT Maintenance Window
- Repair Policy Change Proposal – April 2016
- Requests for Student Information
- Safeguarding Individual Information (GLBA "Safeguards Rule")
- Technology equipment and software: how to get/fix/replace and your responsibilities for it
- The California Consumer Privacy Act
- The College of Wooster ERP Data Stewardship
- User Responsibilities and Appropriate Use Principles
- Wireless Handheld Device Allowance
- Wireless Handheld Device Allowance Request
- Wireless Networking Policy
- Show all articles ( 13 ) Collapse Articles
-
Students
-
Employees
-
Connecting to the Network
-
Software
-
- Access Your College of Wooster LinkedIn Learning Account and Connect a LinkedIn Profile
- ArcGIS Access
- Available Software
- Downloads
- Evernote
- Google Cardboard
- Google Earth and Other GIS Programs
- iMovie for Students
- Installing Maple for OS X
- Installing Maple for Windows
- Installing SALT Windows
- Keynote for Students
- Matlab
- Microsoft 365 Licensing and Email after Graduation
- Navigate the LinkedIn Learning Interface
- Omeka
- Open Source Video Editing Software
- Pages for Students
- PDF Creation for Students
- Photos
- Photoshop for Students
- Qualtrics
- RAVE Guardian
- RAWGraphs
- Remote Desktop Access Mac
- Remote Desktop Access PC
- Screen Recording
- SPSS
- Stata
- Tagging and Bookmarking
- Trint
- Video Project Workshop Outline
- Voyant Tools – Free Textual Analysis
- What Technology Do I Need at Wooster?
- What to expect as a class observer
- Wolfram Mathematica @ The College of Wooster
- Zap Works Designer
- Zotero
- Show all articles ( 24 ) Collapse Articles
-
- Access Your College of Wooster LinkedIn Learning Account and Connect a LinkedIn Profile
- Adobe Premiere Pro
- ArcGIS Access
- ARTstor
- Available Software
- BrightLink Projectors for Teaching
- Changing your Apple ID
- Connect to Network Storage and Services from OFF Campus
- Creating Informer Reports
- Downloads
- Google Cardboard
- Google Earth and Other GIS Programs
- iMovie for Teaching
- Informer Reporting
- Installing Maple for Windows
- Installing SALT Windows
- Keynote for Teaching
- Keynote Toolbar Items
- Matlab
- Navigate the LinkedIn Learning Interface
- Omeka
- Open Source Video Editing Software
- Pages for Teaching
- Photos
- Qualtrics
- Qualtrics
- Quantitative Literacy Resources
- RAVE Guardian
- RAWGraphs
- Remote Desktop Access Mac
- Remote Desktop Access PC
- Resources for Class Projects
- Room Assignments File Format
- Screen Recording
- Select Survey Training Manual
- Select Survey User Manual
- Software & Applications Requiring VPN
- SPSS
- Stata
- Tagging and Bookmarking
- Trint
- Video Project Workshop Outline
- Voyant Tools – Free Textual Analysis
- What to expect as a class observer
- Wolfram Mathematica @ The College of Wooster
- Zap Works Designer
- Zotero
- Show all articles ( 33 ) Collapse Articles
-
- Access Your College of Wooster LinkedIn Learning Account and Connect a LinkedIn Profile
- Adobe Premiere Pro
- Available Software
- BrightLink Projectors for Teaching
- Changing your Apple ID
- Connect to Network Storage and Services from OFF Campus
- Creating Informer Reports
- Downloads
- iMovie for Teaching
- Informer Reporting
- Installing Maple for OS X
- Keynote for Teaching
- Navigate the LinkedIn Learning Interface
- Pages for Teaching
- Qualtrics
- Qualtrics
- Quantitative Literacy Resources
- RAVE Guardian
- Room Assignments File Format
- Select Survey Training Manual
- Select Survey User Manual
- Software & Applications Requiring VPN
- Tagging and Bookmarking
- Zotero
- Show all articles ( 9 ) Collapse Articles
-
- ARTstor
- Audacity
- Breaking Language Barriers with Google Translate and AR
- Clipchamp video editor
- Concept Mapping
- Coolors.co
- GarageBand
- Garageband
- Google Cardboard
- iMovie
- Machinima
- Photos
- Photoshop
- Pixabay royalty free photos and videos
- Podcasting Tools
- QuickTime Player
- Screen Recording
- SketchUp
- Storyboarding
- Timeline tools
- Video Project Resources
- Windows Story Remix
- Zap Works Designer
- Show all articles ( 8 ) Collapse Articles
-
- Administrative ERP Program Change Procedures
- Administrative ERP User Access Policy
- Colleague Access Request Form
- Colleague Detailed User Guide
- Colleague UI 5 – Differences from the old version UI 4
- Creating Informer Reports
- Datatel Colleague Learning Guide Basic Navigation – Purchasing
- Datatel Colleague Navigation Keyboard Shortcuts
- Ellucian (Colleague)
- Ellucian (Datatel)
- Informer Reporting
- Name Computed Columns
- Other Datatel related forms
- Purchasing Documentation
- Room Assignments File Format
- The College of Wooster ERP Data Stewardship
- Using Select / Returning Criteria
- Show all articles ( 2 ) Collapse Articles
-
-
Printing
-
Loanable Technology
-
- Canon E05 Rebel DSLR
- Canon Vixia HF R800 HD Camcorder
- Canon Vixia Video Camera
- Conference Kit
- GoPro as a Webcam
- GoPro Hero 8 Black
- GoPro Kit
- Logitech ConferenceCam
- Logitech Webcam C930e
- Mi Sphere Camera Kit
- Overhead Document Cameras
- Portable Classroom
- Rylo 360 Camera
- Tabletop Document Cameras
- Video Adapters
- Video Chat Kit
- Show all articles ( 1 ) Collapse Articles
-
-
Microsoft 365
-
- Calendar Sharing
- Check Junk Mail
- Creating an Inbox Folder and a Rule within Outlook
- Email Distribution List Use ("ZWD lists")
- Email Setup on a Mobile Device
- Email Troubleshooting
- Forward/Redirecting your email
- Installing FindTime
- Make Outlook your default email client
- Managing Junk E-Mail
- Managing your Office 365 Quarantine
- Microsoft 365 Licensing and Email after Graduation
- Microsoft Outlook
- Missing an Email?
- New Email Accounts
- Outlook Basics
- Outlook open another mailbox
- Set up an email account in Outlook
- Using Office 365 Groups
- Using Quick Steps
- Wooster Email
- Wooster’s External Email Alert Indicators
- Show all articles ( 8 ) Collapse Articles
-
- Conducting class if you or some of your students are participating remotely
- Conducting interviews and campus talks/teaching demos with remote candidates
- Getting to know Microsoft Teams
- GoPro as a Webcam
- Making Meetings with Microsoft Teams
- Microsoft Teams Information
- Microsoft Teams Live Events
- New Recording Storage Location on Teams WITHOUT Recording Ready Email
- Online Learning/Streaming Classroom Remote
- Online Meeting
- Partial and Full Classroom Upgrade Media Setup for Microsoft Teams
- Participating in a meeting as a Guest
- Portable Classroom Media Setup for Microsoft Teams
- Scheduling a Teams Meeting
- Sharing Content in a Microsoft Teams Meeting
- Teams & Zoom comparison
- Teams Meet Now
- Teams Meeting Breakout Rooms
- Using a Scheduled Meeting
- Using Closed Captioning Within Teams
- Using Teams in the Streaming Classrooms
- Video Conferencing Classroom Technology
- Video Conferencing with The College of Wooster
- Show all articles ( 8 ) Collapse Articles
-
-
Moodle
-
Network, Cybersecurity, and Best Practices
- Encrypting Devices
- Encrypting Mac Systems
- Encrypting Mobile Devices & Tablets
- Encrypting Windows Systems
- Information & Cyber Security @ Wooster
- Protect Your Computer
- Protecting your Personal Network
- Removing VPN From your Mac
- Safeguarding Individual Information ("Red Flags", "Identity Theft")
- Securing Portable and Mobile Devices
- VPN – Mac OS 10.13 or Later
- VPN – Mobile Devices and Chromebooks
- VPN – Windows
- Wooster’s External Email Alert Indicators
-
Multi-Factor Identification (MFA)
- Change Your Password
- Changing Your Mac Password While Off Campus
- Forgotten Passwords
- How to setup MFA (Multi-Factor Authentication)
- Multifactor Authentication Instructions for using wireless networking when phone service is not available
- Multifactor authentication while out of the US.
- Password changes
- Password Policy
-
College of Wooster Password
-
Phones and Conference calls
-
Scanning
-
Resources for Retirees
-
Using the Self-Service Portal for Equipment Reservation
-
Online File Storage Options
-
Computer Lab
-
Classroom Controls
-
Classroom Setup
-
Classroom Resources
-
Classroom Troubleshooting
User Responsibilities and Appropriate Use Principles
Appropriate Use Principles and Policy
Users of the College of Wooster’s technology services agree that:
- Academic and educational uses are always given priority.
- Technology facilities and network services are provided as shared resources for all users. No user shall use College computing or network resources in such a way as to interfere with the ability of others to use them.
- Users are expected to have a fundamental understanding of information and cybersecurity risks and to complete the College’s annual awareness program.
- A user’s account is the responsibility of the user. Sharing passwords or granting access to anyone other than the user are not permitted.
- Use of College-provided technology systems, applications, and services is governed by the College’s policies that guide student, staff, and faculty behavior and use of College-provided resources. These policies are included in the Scot’s Key, Faculty Handbook, Employee Handbook, The Handbook of Select College Policies, technology use policies for specific systems and applications, as well as department and program policies.
- Use of College-provided technology systems, applications, and services is governed by applicable laws and regulations; College-provided technology systems, applications, and services must not violate any law or regulation, including those pertaining to information privacy and security.
- Electronic mail and other College messaging systems including social media applications will not be used to send abusive, obscene, or otherwise harassing communications.
- Security of the technology systems is in place to ensure resource availability to all users. No user will seek to break the security of any College provided network, technology system, or application.
- Users are not permitted to attach wireless access devices to the College network. Please refer to the Policy on Wireless Access to the College of Wooster Network (Wireless Networking Policy) for further information.
- Students, staff, and faculty are expected to keep an active College of Wooster (wooster.edu) e-mail account. Emergency, official, and unofficial communications are sent by e-mail to campus members’ wooster.edu e-mail address. If students prefer to maintain a different e-mail address than that provided by the College, they should set their College of Wooster account to forward their mail automatically to their preferred account.
- Software will not be copied or used illegally; similarly, use of software and applications provided by a service (“cloud”) is restricted to the licensed user only and in accord with the provisions of the license.
- Electronic materials, including web sites, documents, and images, are to be cited appropriately and permission obtained for use of copyrighted material.
- Personal web sites/blogging sites are intended for the personal use the students, faculty and staff of the College. Users may not “donate” their personal web or blogging space for the use or benefit of off campus organizations. Personal web and blogging sites must be maintained by their respective owners.
- No technology resource will be used for commercial or non-College related purposes.
Sharing Information, Ideas & Files: Respecting Copyright and Intellectual Property
The College of Wooster supports the free exchange of information and ideas facilitated by sharing files over the College network and the Internet. Any copyrighted material shared must be accompanied by the appropriate permission from the owner. Unauthorized sharing or distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject users to:
- A request to remove the material immediately.
- Removal of the material by Information Technology personnel.
- Loss of access to College technology services.
- Disciplinary review and sanctions.
- Criminal and civil liabilities.
Privacy
Users should be aware that while the College complies with all applicable information privacy regulations, the privacy of technology use cannot be guaranteed. Although the College does not routinely examine the content of user files on College-owned or College-controlled computer systems, it does reserve the right to do so (see “Investigations Requesting Information from IT Systems & Applications“). Users should also understand that College applications and data are routinely copied for backup purposes –for example, individual Microsoft 365 OneDrive files are continuously “backed up” in the “cloud” by OneDrive. The College takes steps to protect the data residing on the computers that it owns or controls from unauthorized access or loss. Users should understand that the while the College and user applications backup data, the backup cannot be guaranteed.
Many software systems are designed to collect usage information and to log user activity. The College or application provider routinely aggregates the data stored in these logs for analytical purposes. In general, the College makes no attempt to extract from the logs data regarding the activity of individual users. The College does, however, reserve the right to do so (see “Investigations…” above).
Policy Enforcement
All users of The College of Wooster’s technology services are responsible for understanding the principles and expectations set forth above. Alleged violations of the acceptable use policy or other technology and information privacy/security policies will be investigated. Users found to have violated any provision of the policy will be subject to disciplinary review and sanction. Such sanctions could include, but may not be limited to, loss of access to College technology services, suspension, dismissal, or criminal or civil penalties.
Definitions
- Technology facilities: all College-owned and provided technology equipment, general and specialized labs, classroom and space technology, multi-function print devices, digital display/signage, etc.
- Network services: includes College network resources, Internet-based resources, network services provided through wireless/cellular/broadband providers
Revised: 30 June 2010 (HEOA compliance) 27 June 2022 (update College & technology terminology; add: College policies, reference to applicable law and regulation, required cybersecurity awareness training)