Search259 Results
- Knowledge Base
- Information Security and Data Protection
Recommendations and answers to recent questions related to security and privacy in Zoom
- Knowledge Base
- Information Security and Data Protection
- Vendor Risk Management
A description of when and how to involve Dartmouth's Office of Information Security in the process of procuring a good or service.
- Knowledge Base
- Communication and Collaboration
- Zoom
- Zoom - Faculty Resources
This article covers recommended security settings for class meetings and office hours and for the secure handling of class meeting recordings.
- Knowledge Base
- ITC Event Notices
- Regularly Scheduled Events
This document describes the Information Technology & Consulting (ITC) requirements for maintaining up-to-date operating system security patches on all Dartmouth College managed servers.
- Knowledge Base
- Human Resources
- Recruitment Toolkit
- Reference Checking
Lists the policy/procedures for employee reference checks and skill proficiency testing.
- Knowledge Base
- Information Security and Data Protection
ITC Security is actively identifying and responding to security and privacy concerns. Please favorite this article and check back often, as it will be updated with new information and guidance on how to protect your privacy and data.
- Knowledge Base
- Computer, Device, and Printing
- Email & Calendar
- Outlook - Email and Calendar
In our continuous effort to enhance email security and efficiency for the Dartmouth College community, we are addressing an often-overlooked aspect of email management: Graymail. Learn what Graymail is and how our upgraded email security system smartly organizes such emails into a dedicated "Promotions" folder, keeping your inbox clean and your focus sharp.
- Knowledge Base
- Infrastructure
- Data Backup and Restore Services
The following article explains the general configuration for all backup policies configured and operated by Infrastructure Services. These policies may be slightly tailored to fit various different use cases but all policies will have generally the same configuration guidelines.
- Knowledge Base
- Teaching, Learning and Classrooms
- Canvas
How to use Post Policies in Canvas to release grades when you want them to be released.
- Knowledge Base
- Infrastructure
- Email Services
Our organization's email security policy mandates the use of DMARC, complemented by either SPF or DKIM compliance for bulk email services. To address SPF's limitations, dedicated subdomains are utilized for enhanced email management. This approach upholds secure and dependable email communication within our organization.
- Knowledge Base
- Software and Solutions
- Other Software
- Other Help
How to get access to Oracle when you get you receive the message that it was blocked by Java security. This article only applies to Windows computers.
- Knowledge Base
- Computer, Device, and Printing
- Email & Calendar
Email security is primarily supported through the Microsoft Office 365 Email service. All email is filtered and sanitized by this service before delivering to users and other services including O365 mailboxes, Gmail, and other forwarding services. User experience and functionality may be slightly different depending on where your mailbox is maintained and this document is intended on providing a high-level overview only.