Search47 Results
- Knowledge Base
- Network - Connectivity
- Wired Network
Department-owned devices connect to a secured segment of the wired network.
- Knowledge Base
- Network - Connectivity
- Wired Network
Authentication, network segment do's and don'ts and more.
- Knowledge Base
- Network - Connectivity
- Wired Network
Allowed sharing and collaboration resources for the ECU wired network.
- Knowledge Base
- Accounts - Access
- Account Authentication
CURRENT USERS. Set up and manage verification methods that allow you to access ECU apps and systems.
- Knowledge Base
- Accounts - Access
Submit the online Password Change form, visit your nearest Pirate Techs location or the self-service password reset portal.
- Knowledge Base
- IT Security - Compliance
- Information Security
All ECU users are responsible for the information in their care. See these opportunities to help you meet this important goal.
- Knowledge Base
- Business
- Xtender
Approvers conduct annual quality reviews and audit guidelines requires twice yearly security reviews.
- Knowledge Base
- Accounts - Access
Password security tips plus a trick to help you create an easy-to-remember password.
- Knowledge Base
- IT Security - Compliance
- Approvals - Exceptions
File sharing is prohibited at ECU unless a user is granted an exception. These are the conditions users must follow when allowed a file sharing exception.
- Knowledge Base
- Accounts - Access
- Alumni User Accounts
Alumni only. Activate your account and reset your password using the Microsoft's SSPR service.
- Knowledge Base
- Accounts - Access
- Alumni User Accounts
Alumni use Microsoft 365 account settings to manage passwords and authentication methods.
- Knowledge Base
- Accounts - Access
- ECU User Accounts
ECU-managed Mac users change their password locally rather than using PirateID Self Service.
- Knowledge Base
- IT Security - Compliance
- Information Security
To prevent data loss and compromise, every user should report security concerns whether benign and accidental or malicious and deliberate.
- Knowledge Base
- IT Security - Compliance
- Information Security
Protect ECU data by following this guidance when using your personally-owned computer for university business.
- Knowledge Base
- IT Security - Compliance
- Information Security
These security manuals outline your information protection responsibilities whether employee, manager or IT support staff member.