SU Copyright Guide

In an effort to raise awareness of the importance of Copyright here at SU, please take a moment to review the information on the SU Copyright & Information Policy Office web site.

This web site serves as the home of SU’s Using Copyrighted Works in Teaching: A Guide for Syracuse University Faculty. This manual is created to help members of the Syracuse University community legally use a variety of protected works for curricular purposes.

Continue Reading

Network File Storage

As you logon to a Maxwell computer with your NetID you will see the following networked drives.

H Drive = Home directory

This space is for personal data storage.   Your home directory is backed up nightly, data that is stored in your directory for 24 hours can generally be recovered if lost or corrupted.

Continue Reading

Mobile Teaching Carts

Mobile Teaching Cart

Mobile Teaching Carts (MTCs) are carts with a computer, speakers and projector.  ICT provides these carts for use rooms in the Eggers/ Maxwell complex that do not have installed computers and projectors.  You can log into the computer with your Maxwell computer account to access network drives, email, etc as on other computers.

Reserve a MTC

Continue Reading

SU’s new Mobile Device Security Standard


To help counter the serious and increasing threats to mobile devices such as smartphones and tablets, Information Technology and Services (ITS), in collaboration with ICT and other IT groups across campus, developed and recently began implementing a new Mobile Device Security Standard.

ICT will be following the campus-wide implementation date of January 7, 2013.

The Mobile Device Security Standard will improve security of data that resides on your mobile device by helping prevent loss or compromise of that data, whether it’s your personal data or Syracuse University’s data. This standard will not only help protect you from identity and data theft, it will help protect Syracuse University from adverse consequences and costly breach notification requirements in the event your device is lost or stolen.

Any mobile device you use to access SU’s Exchange email system through any protocol other than Outlook Web Access (OWA; on a browser is subject to the standard. The reason for this is that whenever your mobile device connects to Exchange it can receive and store confidential data, without your immediate knowledge.

Upon implementation, your mobile device will be configured with these security settings:

  • A numeric passcode with a minimum of 4 characters
  • The device will automatically lock after 15 minutes of inactivity
  • Device encryption will be enabled, if supported (iOS devices do this automatically when the passcode lock is set)
  • The device will be automatically wiped after 10 failed passcode entry attempts
  • You will be prohibited from disabling security settings
  • IMAP access to your Exchange mailbox will be disabled

The security standard will also standardize the existing ability for you or authorized IT personnel to remotely wipe your device if it is discovered to be missing.

After this policy is deployed on January 7th, the first time you use your device to connect to Exchange you will be prompted to create your passcode if you have not previously done so. You will use this passcode to unlock your device from that point on.

See the recent Mobile Device Security article on the ITS web site to find out more and to see how the standard will affect you and your device(s).

 Questions? Want more information?

For an FAQ, click here.

For other questions or comments, please contact x3847. If your question is about a specific device, please include device make, model and OS version.

Software Licensing

It is Syracuse University’s policy to comply with all software license and intellectual property agreements. ICT will not install software without adequate evidence of proper licensure and will not intentionally violate the terms of software license agreements.

Laptop Encryption Standard

Secure 'cuse

The campus Information Security Group introduced a Laptop Encryption Standard effective March 1, 2011.  This standard requires all university owned laptops to employ the full disk encryption solution “CheckPoint FDE” currently funded by ITS. Continue Reading

Electronic Equipment & Software Purchases

In order to provide better asset management, data security, and to obtain the very best pricing, the University is in the process of revising many of its purchasing policies and in particular has changed how administrators and faculty may acquire certain electronic equipment and software purchased with University funds.  Continue Reading

Moving Computers

Desktop computerICT is responsible for moving all Maxwell supported computer equipment. Departments may not, without ICT authorization, move computers from one room or space to another.

Please contact ICT ( or 443-3847) if you anticipate any changes in your office area that may require moving computing equipment.  Extension cords and power strips are the responsibility of the department.

ICT Support Response Time

Response to Service Requests

ICT will respond to service requests within four hours under normal circumstances. Responses may be delayed when there are system problems or during periods of very high demand (start of the semester, finals week).

A response may include:

  • acknowledging receipt of the request
  • scheduling an appointment
  • sending out someone to the site
  • resolving the problem remotely and providing notification
  • sending instructions or suggestions on how to fix or work around the problem/issue

Hours of Operation

Hours of Operation

ICT is staffed Monday – Friday during normal University hours:

  • Fall, Winter and Spring semesters:   8:30-5pm
  • Summer semester: 8 – 4:30pm

There is no 24 hour or holiday staffing.  ICT staff may be available for events if discussed and approved by ICT in advance.

Green days

Green Days

ICT staff monitors both voicemail and emails to during university green days.

Electronic classroom presentation problems

Electronic classroom presentation problems:

During normal business hours ICT endeavors to respond quickly to presentation problems in Eggers and Maxwell Hall classrooms.

For support outside of normal business hours call Classroom Presentation Services (x5660) for assistance. They will assist with operational problems and contact ICT staff directly for computing related problems.

Other Critical Issues

What about other critical issues?

For other critical issues, you should email or call 443-3847. ICT monitors email support requests during the normal business hours and will respond as soon as possible.  ICT also monitors the Maxwell network, our servers and our link to the rest of campus.

As a secondary option you may call 443-4742 to speak with ICT administrative staff who may page someone if appropriate.

Maxwell Computing and Externally Funded Research

Computer ChipsExternal support for research is an important priority for the Maxwell School. We have found that virtually all externally supported research projects ultimately have computing implications. In the most basic cases, our technology environment supports research by providing access to basic services like word processing and electronic mail for communication among researchers. And, of course, some projects will make extensive use of computing for such things as data analysis and storage; video conferencing, or technical support.  ICT is eager to consult with you as you begin to develop funding proposals.

Early conversations with ICT can be helpful in several ways:


  • ICT can do an initial assessment of likely technology requirements for your research.
  • If your proposed research will be using technology resources, we can provide you with language you might use in your proposal to describe the Maxwell computing environment and how it will facilitate your research.
  • While most Maxwell computing services are available at no charge to Maxwell faculty for ordinary teaching, administrative, and research activities, we do expect that, to the extent permitted, externally supported research proposals will include budgets for any additional computing costs associated with that research. For example, special application software, additional computers, significant amounts of additional storage, videoconferences and other technology-supported events all have costs associated with them that should be covered by external funds, overhead recovery, or as a cost match in the proposal (cost matches must be approved by ICT and the Dean’s office).

To help with proposal preparation, we have a general description of the Maxwell technology environment as well as University approved rates for some of ICT’s commonly used services. Again, we encourage face-to-face conversations as you begin to develop your proposal.