Skip to content

Posts

Software purchase form doesn't pertain to OSL, PCards

Blue-tinted image of a keyboard key with a shopping cart on it.

A recent Node 4 article about a requirement to use a software purchase request form for all new and renewal software, web-based applications, and mobile application acquisitions — regardless of cost — pertained to UShop.

Share this article:

IT governance roundup

IT Governance

The Strategic Information Technology Committee (SITC) met on May 9. The Enterprise Web Advisory Committee (EWAC) will meet on June 8. The next Architecture and New Technology Committee (ANTC) and Teaching and Learning Portfolio (TLP) meetings are to be determined.

Share this article:

Explainer: Remote Access Rule (4-004H)

An illustration of a man standing before a wall with a keyhole opening. Through the opening, a bright line shines out from a city skyscape.

Rule 4-004H outlines the requirements and user responsibilities when accessing the university’s IT resources, information systems, and information assets remotely (e.g., Citrix and virtual private network).

Share this article:

Travel tips to avoid becoming the victim of a cybercrime

Person on an airplane typing on a laptop computer.

Swimsuits and sunblock aren’t the most important things to think about when packing your bags. As you embark upon your next trip, access the Information Security Office offers some best practices to keep your travel free from cybercriminal meddling.

Share this article:

ISO: Do not use Slack for university business

The Slack logo

The U does not have a license for Slack, so it is not approved for university business. It’s also not approved for creating, processing, transmitting, or storing restricted and sensitive data as required by university policy.

Share this article:

IT security tip: Going beyond the basics

An illustration of two people sitting next to a laptop that has a shield on its screen. On the right is a transparent purple box with white lines to represent text. In the background is a purple wall with shield, document, email, lock, file, cloud, and magnifying glass icons.

While basic IT security practices will help you protect your data, you can take additional steps to make a data breach or cyberattack more difficult for criminals and incident response easier for you.

Share this article:
Last Updated: 2/20/26