Phishing Training

Phishing is when suspicious links are embedded in email messages, texts, or websites that might look legitimate at first glance. Those behind the attacks hope you will take the bait and click so they can try illegal tactics to steal your information.

Data Migration Policy

On University owned computers

In some instances, such as certain virus infections, the only software repair option available for your computer may be to reformat the hard drive. Reformatting the hard drive means completely erasing all files and data on your computer and performing a clean install of the operating system.

Desktop Refresh Program

Effective FY24, the Desktop Refresh Program will adopt a shared funding model that allows for improved consistency and longevity of the program.

Summary

ITS will cover the cost of a Windows desktop or $1000 toward the cost of another machine in the program. Any additional accessories/upgrades (docking station for laptops, second monitor, printer, additional RAM, etc) will be the responsibility of the unit.

Acceptable Use of Information Technology Resources

The primary purpose of information technology resources at the University of Illinois Springfield is to enhance and support the educational mission of the University. Access to the University’s technology resources is a privilege granted to University students, faculty, staff, and approved guests. These resources include hardware, software, computer accounts, local area networks as well as connections to other computer networks via the Internet. Everyone using these resources is responsible for using them in an appropriate, ethical and lawful manner.