- Knowledge Base
- Teaching - Learning
- Canvas & Integrated Tools
This article provides a list of all LTI and Publisher tools available in Canvas along with links to set up and support resources.
- Knowledge Base
- Teaching - Learning
- Canvas & Integrated Tools
When using ECU digital media capture systems, you agree you have been informed and understand the best practices and policies as well applicable laws associated with these tools
- Knowledge Base
- Teaching - Learning
- Learning Technologies
- Panopto Video
You must agree to the conditions in this confidentiality agreement to be granted administrative privileges to Mediasite.
- Knowledge Base
- Teaching - Learning
- Canvas & Integrated Tools
Occasionally, viewing access to course recordings is required for peer review, accreditation, sharing, etc. See this standard procedure for requesting access.
- Knowledge Base
- Teaching - Learning
- Learning Technologies
- Panopto Video
This article provides resources to help students learn to get started using the viewer, recording, uploading and editing videos.
- Knowledge Base
- Teaching - Learning
- Learning Technologies
- Panopto Video
Panopto users can opt-in to have Webex Meetings they host automatically imported into Panopto. See how to enable this option in your Panopto account settings.
- Knowledge Base
- Research Computing
- REDCap
Comprehensive tutorial list for REDCap.
- Knowledge Base
- Communication - Conferencing - Collaboration
- Cisco Webex
- Webex for Instruction
This article covers steps to reauthorize Webex in Canvas.
- Knowledge Base
- Communication - Conferencing - Collaboration
- Cisco Webex
- Webex for Instruction
This article provides steps for inviting guests to participate in meetings scheduled in Canvas.
- Knowledge Base
- IT Security - Compliance
- Sensitive Data
This MOU outlines the scope of services and responsibilities for systems hosted by departments.
- Knowledge Base
- Accounts - Access
This is only a test...
- Knowledge Base
- Communication - Conferencing - Collaboration
- Email & Listserv
- Email
Secure the sensitive email you send outside the ECU network and read the encrypted email you receive.
- Knowledge Base
- IT Security - Compliance
- Sensitive Data
Practice responsible data management using ECU’s approved online storage for sensitive and non-sensitive data.
- Knowledge Base
- Hardware - Software - Storage
- Storage
See this feature comparison of ECU's approved storage options.
- Knowledge Base
- Hardware - Software - Storage
Determining your best data management plan begins with determining your data types: sensitive or non-sensitive.
- Knowledge Base
- Hardware - Software - Storage
- Storage
- OneDrive
Microsoft OneDrive cloud storage is available through your employee Microsoft 365 subscription and alumni email and is the only approved cloud storage for ECU data.
- Knowledge Base
- Hardware - Software - Storage
- Storage
- OneDrive
Resources for OneDrive cloud storage.
- Knowledge Base
- Teaching - Learning
- Canvas & Integrated Tools
See this convenient, comprehensive list of IT knowledge base articles
- Knowledge Base
- Teaching - Learning
- Canvas & Integrated Tools
Each LTI is reviewed and approved through the Technology Security Assessment with oversight from the Academic Technologies Advisory Committee.
- Knowledge Base
- Teaching - Learning
- Canvas & Integrated Tools
This article provides steps for setting up and using Adobe Spark in Canvas. Steps for instructors and students are covered.
- Knowledge Base
- Teaching - Learning
- Canvas & Integrated Tools
Since Departmental Administrators of IT systems may have increased access and privileges, they must also agree to the contents of this document annually.
- Knowledge Base
- IT Security - Compliance
- Sensitive Data
ECU has designated FERPA data as Level 3 Sensitive/Confidential. Learn how to store and access FERPA.
- Knowledge Base
- IT Security - Compliance
- Information Security
To prevent data loss and compromise, every user should report security concerns whether benign and accidental or malicious and deliberate.
- Knowledge Base
- Hardware - Software - Storage
- Equipment
All mobile devices used to access ECU email or other business functions require the device meet security requirements and be encrypted. This article outlines how to enable encryption on your personal mobile device.
- Knowledge Base
- Hardware - Software - Storage
- Equipment
Guidance for the appropriate use and security of department-purchased mobile devices to protect the ECU network and information from unauthorized access.