Identity Finder: Coming Soon on KBOX

5 05 2011

Today’s IT Forum with trainer Jack Williams was all about Identity Finder. What faculty need to know:

  • Sometime next week, KBOX will push out a new program to your computer called Identity Finder.
  • Identity Finder is a software tool that scans your computer for unsecured Personally Identifiable Information (PII).  It looks for things like Social Security numbers, credit card numbers, bank account numbers, passwords, etc (full list here) using pattern recognition and contextual analysis.
  • While the program will be automatically installed by KBOX, it won’t run automatically – so you can choose when you want to run it.  Jack recommends running it once each quarter.
  • When you do start the program, it will scan all of the files saved on your computer (including any email and email attachments that you have saved locally) and search for PII.  Jack noted that the scan can take a long time (average 3.5 hours), but you can run it in the background as you do other work.
  • At the end of the scan, Identity Finder will show you a list of any information it has identified as potential PII.  You can then review that report and decide how to act on each item. Options are to “shred” (delete completely from your machine), “scrub” (redact the sensitive information from the document), “secure” (password-protect the file), “quarantine” (save to a secure location, i.e. a folder on RoyalDrive), “recycle” (send to recycling bin), or “ignore” (for false positives – the file will be ignored in future Identity Finder scans).  If Identity Finder picks up PII in a Thunderbird email file, Jack recommends deleting it by going through Thunderbird rather than through Identity Finder.
  • You’re the only person who can review your scan results (there’s no automatic reporting back to IR, for example). When the scan is complete, Identity Finder sends a brief report back to a central management server indicating what PII has been found and what PC it is on.  It does not allow that central server to access the actual files on your machine.  The only people who can access that central server are the staff of the Information Security Office, and they will review Identity Finder reports from a University machine only in two situations: 1) if the security of a machine has been breached, or 2) if the head of a department or area requests the reports to validate the security of machines in their area.
  • Step-by-step instructions will be available here.  Jack has also posted basic and detailed instruction guides (PDF).

Please pass the word along to your fellow faculty members so that no one’s caught off guard next week, and let me know if there are any questions. Thanks!

————–

Updated 5/6/11 with correction from Jim regarding reporting





Live@EDU updates

4 05 2011

I went to an IT Services Live@EDU Information Session, taught by Jack Williams, this morning and picked up some updates about the upcoming email transition.  Below are some of my notes – IT Services folk, please correct me if I got anything wrong.

About the transition:

  • Before we’re scheduled to transition, Microsoft Office 2010 will be pushed out through KBOX, so we’ll all have the latest version of Outlook installed. Not sure what will happen here for Mac users.
  • We’ll have step by step instructions showing us how to configure Outlook to retrieve our (server) mail from RoyalMail. Folder structures will be preserved.
  • Anyone who needs to migrate local email from Thunderbird can use a tool called Transend (which will also be pushed out from KBOX). Transend can migrate into Outlook local email from Thunderbird as well as Thunderbird address books.
  • Calendar events can be imported into Live@EDU from Oracle, though connections between people may be lost. Details are still forthcoming.
  • We’ll have a new Live@EDU username that we’ll use to access our email, Office Web Apps, and SkyDrive.  This username will be firstname.lastname (for me, kristen.yarmey).  But your email address will not change.  Note: We’ve mentioned before that R numbers will soon become our user IDs. This is still happening.  So eventually, when all of these transitions are over, you’ll use your R number to log into the my.scranton portal, but you’ll need your Live@EDU username to log in to email.  This is a move away from the single sign-on that we currently have.

About the Live@EDU services:

  • There’s a website of training materials for Live@EDU, currently under construction.
  • Microsoft Web Apps provide online access to limited versions of Word, Excel, Powerpoint, and OneNote.  If you have Microsoft Office 2010, you can easily pull down documents from the Web Apps to edit them more formally in the full desktop client versions.  But as I understand, this capability is not so seamless with Office 2007 and is somewhat troublesome with Office 2003.
  • There were several questions about using SkyDrive and the Web Apps to collaborate with non-Scranton colleagues.  You can use SkyDrive to share documents with non-Live@EDU users, and they can edit the documents on SkyDrive using WebApps (similar to Google Docs), but they can’t upload files – so they wouldn’t be able to pull down documents into a desktop version of Office 2010 and then upload the new version.
  • A question came up about how SkyDrive compares to RoyalDrive. RoyalDrive is not going away, and it has been configured to be used by groups of University faculty and staff (for example, there’s a Weinberg Memorial Library group folder).  SkyDrive is configured only for individual use.  Jack recommended that University of Scranton-specific documents be stored on RoyalDrive.




Good news for iPad users

3 05 2011

Heads up if you’ve tried to use an iPad on campus wireless. Network Infrastructure passed along some good news this morning:

We have received feedback from a number of users regarding the frequency in which iPads have to authenticate to ROYALAIR and how this is causing issues accessing some services from their device. This behavior is due to the unique way in which the iPads manage their wireless connections in that the device disconnects from the wireless network when the device is in a sleep state. Due to a low heartbeat timer in Cisco NAC, the device is decertified from the network while in this sleep state. In order to prevent this from occurring, we have increased this timer to 8 hours so that a user only needs to authenticate once during business hours. Please continue to provide us with any feedback you may have regarding this or any other iPad network issue.

Thanks to Cal and the rest of Network Infrastructure for the fix!





TAG Meeting Notes 4/28/11

29 04 2011

Yesterday was our last TAG meeting of the 2010-2011 academic year.  Hard to believe, but it’s also (approximately) the one-year anniversary of TAG’s founding.  We spent the first part of the meeting reviewing the past year of projects (some more successful than others):

We then had a discussion about where TAG should go from here and what its level of involvement should be like.  Some of the key points of the discussion:

  • What is the most important role for TAG? Our original goals were pretty ambitious. Some members felt that it was bridging the communication gap between IR and faculty.  Others felt that TAG should focus on making sure that IR resources are deployed in the most effective way.  Another thought was that TAG should be a campus leader in using and reviewing new technology tools. There was general agreement that our efforts should focus on teaching and learning, and that our goals need to be more realistic.
  • How involved should TAG be? We discussed a 1-10 scale of involvement with  “1” being just a discussion group and “10” being a highly active group lobbying for campus-wide changes.  We’ve been debating about this since the beginning of TAG.  The members present settled somewhere around an “8,” noting that we should continue to ensure that the faculty voice is heard on technology issues.
  • We also talked about how to manage TAG’s workflow.  One suggestion was to come up with a prioritized list of things that TAG wants to accomplish, and then have each member take responsibility for one or more of those items.  Some could be accomplished by individuals, others would be more of a group effort.
  • Department visits were seen as one of the more effective ways of communicating with faculty.
  • TAG has earned respect on campus from doing good work in the past year.  It’s important to the members that we maintain this reputation.

Bottom line – Jeremy and I will be making up our list of TAG to-do items, and we’ll be sharing them with the TAG members to figure out what TAG’s priorities are and then split up the projects.

If anyone else has thoughts on where TAG should go in 2011-2012, please let us know!





Bboard Moving

19 04 2011

I know not many faculty members are devoted Bboard users, but for those who do use it, there was a portal post today about Bboard moving:

Great News! BBOARD is being replaced with a new product that allows all faculty and staff to access BBoard through the myScranton portal. We will be able to access BBOARD from both on and off campus. All replies to a specific message in the new BBOARD will be grouped or linked to that message so it will be easier to follow a specific conversation.

The new BBOARD will be implemented over the Easter break. Existing postings in the Thunderbird BBoard will remain. All new entries and responses should be posted in the new system. When you return on Tuesday, April 26, log into myScranton and click on the Employee tab. Then click on the link to the new BBoard in the BBoard channel (underneath the Self Service (UIS) channel).

It’ll be interesting to see if and how Bboard use changes now that it will require logging into my.scranton rather than being accessible through Thunderbird.





IT Forum on Identity Finder 5/5

19 04 2011

We’re all invited to the next IT forum (5/5 from 11:30-1pm) to learn more about Identity Finder.  Here’s the invite from IT Services:

Join us at the next IT Forum set for Thursday, May 5, in Brennan Hall, room 509, for an important and interesting look at Identity Finder. This easy-to-use program will allow the entire University of Scranton community to secure the very important information we have stored on our computers.

Identity Finder looks for those files we keep that may be targets for identity theft and other malicious acts. Files holding Social Security numbers, credit card numbers, driver license numbers, bank account data, passwords and more, can be secured to prevent any unauthorized use of your files or data belonging to the University.

Jack Williams, IT Services Training Specialist, will be presenting. All University personnel are encouraged to attend, and lunch will be provided. Please RSVP by e-mailing ITServices@scranton.edu by Monday, May 2.





Feedback Needed: Transformative Teaching and Learning

13 04 2011

Jeremy and I met with CGCE Dean Jeff Welsh yesterday to talk over some ideas for encouraging exploration of transformative pedagogy on campus, inspired by the Deans’ Group Technology Plan discussion last month.

On Thursday, Jeff is proposing to Provost and Deans the creation of an “affinity group” of faculty who engage in transformative pedagogy using learning technologies.  While he’s getting feedback from the rest of the administration, we’d like to get feedback from the faculty on whether something like this would 1) be of interest to you and 2) be an effective way to encourage faculty to explore new pedagogical techniques.  Here are the basics of Jeff’s proposal so far (as I interpret them):

—-

Goal: Create an affinity group of faculty who engage in and facilitate transformative learning using learning technologies.  [Note: What exactly “transformative learning” means is up for discussion – Jeremy suggested thinking of it as “meeting students where they are and working with them to develop pathways to excellence.” “Learning technology” could be interpreted fairly broadly, encompassing information and instructional technology, or any tools that support learning.]

Proposal: Provide support and incentives for faculty to explore the use of learning technologies to resolve teaching/learning problems.

Faculty Tasks:

  1. Identify a teaching/learning problem (e.g., each semester my students really struggle to understand x concept)
  2. Engage in a pedagogical literature review
  3. Design a transformative solution using learning technology
  4. Implement the solution in a class
  5. Assess the results
  6. Disseminate results to the rest of the Scranton faculty (via a presentation, and/or maybe posts to the TAG site)
  7. Disseminate results more broadly, ideally by presenting at a national conference and/or publishing in a scholarly journal

Support/Incentives: In support of this faculty work, incentives could include course release time as well as funding for things like 1) the cost of an adjunct faculty member or overload to cover the course release, 2) cost of support resources (from the CTLE, IR, Library…), 3) equipment or software needed, and 4) conference travel.

Process: Faculty members would submit first a brief feasibility proposal outlining their ideas.  This proposal would be evaluated by a committee, and the authors of the strongest proposals would be encouraged to then submit a longer, full proposal detailing the faculty member’s plans and funding needs.  These final proposals could be shared with the University community for commenting and review, with the evaluation committee making the final decision on whether or not funding would be awarded.  Around four proposals would be awarded funding.

Jeff’s thought is that the first “class” of faculty who received funding would then essentially act as the seed of a growing affinity group.  That first class could help evaluate proposals for the next year.

——–

What do you think? Here’s what TAG would like to know:

  • Would this type of faculty support be effective? Would it help the University effectively explore new pedagogical techniques?
  • Would any of you be interested in applying for something like this?
  • If so, what additional support or incentives do you think you would need?
  • How do we define what pedagogy is “transformative”?
  • What else should the Deans be thinking about?

Post in the comments or to the TAG-Discussion list to let us know what you think. And please forward this information to any faculty members who you think might be interested in discussing it. Thanks!





IT Matters Spring 2011

5 04 2011

The latest edition of IT Matters came out today and is available for download.  A few faculty-relevant highlights:

  • Security Manager Tony Maszeroski explains what the Identity and Access Management (IAM) initiative is all about.  The IAM initiative is the reason behind a lot of the smaller changes you’ll see happening on campus – e.g., your R number becoming your user ID, etc.
  • University of Scranton faculty and staff can get serious discounts on Microsoft Software like Office 2010 and a Windows 7 upgrade if they need the software on their home computers for work-related purposes.  Check out http://www.journeyed.com/select/go/CAUSCRANTON for pricing – just know that you’ll have to fax or email a copy of your Royal ID in order to complete your order.
  • There will be some major outages this summer from 7/28/11 through 8/2/11 as we go through an Enterprise Resource Planning (ERP) upgrade to a new operating system.  More details when we get closer to the migration date.
  • Three rooms in the Unified Science Center will have lecture capture capability.  If you’re interested in lecture capture, let TAG know – we need your input!
  • Deployment of Microsoft Forefront as a replacement for McAfee continues.  All campus PCs should be switched over by the end of May.  All faculty should get two warning emails with instructions in the week before their computer is scheduled for Forefront deployment.
  • Should funding be secured, campus wireless will be upgraded within the next six to ten months, starting with the dorms and followed by academic and administrative spaces.

——–

Note: Post updated 4/5 at 3pm with a clarification on campus wireless from Network Infrastructure.





More on the Mobile App

4 04 2011

TAG has gotten a few questions and heard a few concerns about the new Scranton iPhone and Android App.  Just thought we’d post some extra information about it:

  • There are two different mobile tools available – one is the mobile app, which is available for iPhones through the App Store and for Android devices through the Android Market.  The other is the mobile website, which you can view from any internet browser at http://m.scranton.edu.
  • Both the app and the mobile website are optional – you can use them if you find them convenient, but no faculty member (or anyone else) is obligated to use them.
  • The app does access some data from your phone in order to make the features work.  For the Android version of the app, these are spelled out in the Android Market page under Permissions.  The Permissions page mentions that “malicious applications” can use those permissions to do bad things – this is boilerplate language from the Android Market, essentially warning you not to download and install apps from developers that you don’t trust.  In this case, the app is coming from the University via Straxis Technology and is not malicious.
  • The app can use your GPS location in order to place you on a map for the Campus Tour feature. However, at least on the iPhone version, you are asked whether or not you will allow the app to use your location before it pulls this data.  I believe the Android version asks user permission as well – can any Android users confirm?
  • There was some faculty input in the app development – I sat in on meetings with the Mobile Applications Team as a representative of the Library.  I was asked by IR and PR not to post details during the vendor selection process, but I’m happy to share my feedback report and thoughts with any interested faculty.

As usual, if anyone has questions, clarifications, or concerns, please post below or to the TAG-Discussion list.





Academic Technology Plan

24 03 2011

On Monday, the Deans’ Group held a half-day retreat to discuss the idea of writing an Academic Technology Plan for the next five years.  Members of TAG were invited to assist in the formation of the plan.  Many thanks to those who were able to attend, and thanks as well to the Deans’ Group for including us!

I’m posting my notes from the retreat (in PDF format) for review by any interested faculty members – please let us know what you think, particularly about the draft vision statement and goals.

The next step is for the Provost’s office to start writing up an actual draft of the plan. I’ll post again when there’s a draft ready for faculty review.