Skip to content

Posts

Explainer: Backup and Recovery Rule (4-004K)

A pink-hued illustration of a cloud behind three round storage servers with binary code in the background. Various icons make up each square of the cloud.

The Backup and Recovery Rule outlines the requirements for backup and recovery of the U’s information systems and data in the event of a natural disaster, system failure, ransomware, or similar disruption.

Share this article:

U signs three-year renewal for DocuSign

Illustration of the DocuSign e-signature service interface on mobile devices, courtesy of DocuSign.

The university has signed a three-year campus-wide license renewal for DocuSign, a cloud-based e-signature software authorized for university business purposes, including forms and documentation.

Share this article:

Namecoach pronunciation tool coming to Canvas

Namecoach logo

Namecoach, a web-based tool that allows users to record and share the pronunciations of their names with others, will be available at no cost to U community members who use Canvas on August 1. A Microsoft integration for Outlook and Teams is coming soon.

Share this article:

IT governance roundup

IT Governance

No IT governance bodies met in July. The Enterprise Web Advisory Committee (EWAC) will next gather on August 10; the Strategic Information Technology Committee (SITC) will reconvene on September 12; the Architecture and New Technology Committee (ANTC) will return on September 25; and the Teaching and Learning Portfolio (TLP) will meet at a date to be determined.

Share this article:

Don't document? You may be less efficient than you think. 

A man wearing glasses sits at a desk, holding a sheet of paper in each hand.

Poor documentation can be problematic. To address these issues, a UIT/ITS Documentation Community of Practice was formed to discuss strategies, policies, and procedures related to IT documentation.

Share this article:

Explainer: Log Management and Monitoring Rule (4-004J)

Green and orange lines of code on a dark background.

The rule outlines the configuration, review, and IT security requirements for the log management and monitoring of the U’s information systems to help detect unauthorized activity, assist in IT security incident investigations, and protect the university’s data and information systems.

Share this article:

Utah's a pioneer in data privacy protections

A black and white image of the Utah State Capitol.

Once you know some of the basics about Utah's data privacy laws, like the Utah Consumer Privacy Act, you can create a plan and make informed decisions to protect your personal information.

Share this article:

U alumni required to use Duo 2FA starting 6/27/23

The Duo logo

UIT will gradually activate Duo 2FA for alumni access to UMail from any email application — e.g., Microsoft Outlook (Windows, macOS, Android, iOS) and Apple Mail — and Campus Information Services (CIS).

Share this article:
Last Updated: 4/11/22