Topic
The purpose of this page is to help you get acquainted with some of the ITS resources available to you! You will have a direct link to the Information Technology Use Policy, information about setting your password as well as where to store documents and links to online resources (where to fill out your time sheet! Creating a GU Signature, and several different training sites).
Prerequisites
ITS Introduction Video
Information Use Policy
Please read our Information Technology Use Policy in full: www.gonzaga.edu/information-technology-use-policy
Focal Points of the IT Use Policy
- Keep sensitive data private and protected
- Do not share your credentials
- Consequences of violating this policy can include administrative sanctions
Instructions
Getting Logged On for the first time
An email will be sent to the personal email address we have on file. The welcome email will contain your username, your gonzaga email address and a link to the password reset page.
After you brainstorm a good passphrase (15 characters minimum), click the link in the email and use the Reset Password button to set your first password. For more information about setting your first password visit the Password Reset or Change page on our website.
Log in to https://my.gonzaga.edu using your email address and newly set password and follow the prompts to set up Multi-Factor Authentication (MFA).
MFA - push notification is recommended.
Document Storage
- Storing documents in the cloud (OneDrive or SharePoint) is more secure than storing on your desktop/laptop
- Desktops and laptops are not backed up, any files you save on your desktop or laptop could be lost
- ITS recommends that you turn on OneDrive sync for easy local access to your OneDrive files. For more information about OneDrive and turning on sync: https://support.gonzaga.edu/TDClient/30/Portal/KB/ArticleDet?ID=185
Email Security
- NEVER email sensitive Personally Identifiable Information (PII) data—credit card numbers, social security numbers, student or employee ID numbers, any information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual.
- If you MUST email PII, please do so using encrypted email by clicking Options>Encrypt>Encrypt Only. Not all attachments will be encrypted with the email. You must send attachments as a .docx or .xlsx format (as these file formats support rights management). If you try to send an encrypted email with a .pdf or .csv file format you will get a notice that the attachment will not be encrypted.
- If you need to send confidential info as part of your job, contact the Support Center for assistance.
Resources
Additional Information
For any dept or software specific access needed, the supervisor should submit the General IT Assistance ticket and describe what you need in the description field. Supervisors may also need to request:
- that employee be added to the security group for your departmental files on SharePoint (if your department has that),
- door access (if controlled by ID card)
- phone extension (new, or which # are they taking over)
- OnBase access (specify to what and if there are any document types they should NOT see. You can also instruct us to mirror an existing employee's access if that's easier)
- specialty distribution groups (departmental)
Additionally, these require a separate/specific access form: