Search66 Results

The Responsible Use of Technology policy outlines appropriate use of computers, printers, fax machines, and other technology hardware, software, and the network on which all are connected.
View the full technology training catalog from the TRC. Custom and one-on-one trainings available on request.
The Central Tech Store is the primary source for technology hardware and accessory purchases at UCO. All individuals and departments looking to purchase technology hardware or accessories (including batteries, power cords, adapters, etc.) will need to follow the information and steps outlined in this article.
After months of research and evaluation as well as the contributions of a user evaluation team, the Enterprise Mirroring Project team makes the following recommendation regarding technologies for use in mirroring devices to screens in classrooms and meeting spaces at UCO.

Two products were identified as potential solutions for use in mirroring technology-related projects/requests.
The 'Call for Projects' will provide the university a more efficient and effective process to moves projects from request through implementation. This article provides a summary of the process and workflow.
IT projects can be complex and require a great deal of planning and coordination. OIT has a team of experienced professionals who can help you with all aspects of your IT project, from planning and design to implementation and support.
The University of Central Oklahoma has the responsibility for securing its computing and networking systems (both academic and administrative) against unauthorized access, while making the systems accessible for legitimate academic and administrative uses.
Description, restrictions, and links to Assistive Tech (AT) software including built-in AT features in existing software and operating systems. For all staff, students, and some available to general public.
Outlines the differences between EULAs, ToU agreements, and T&Cs. EULAs, ToU agreements, and T&Cs. All are legal agreements that outline the terms and conditions under which a user is allowed to use a product or service.
Technology Questions for Software Vendors
Having trouble with your classroom or building technology? Contact your building tech for onsite help/assistance!
The Office of Information Technology is committed to protecting the University of Central Oklahoma; its students, faculty and staff; and its partners from knowingly or unknowingly using technology illegally or through damaging actions. The complete list of policies, guidelines, and procedures regarding the protection and security of technological information that will serve as the University’s standards is listed within this article.
The Office of Information Technology at the University of Central Oklahoma has developed a checklist to be used when creating digital media to make technology more easily accessible for individuals with disabilities of all ages.
As a member of the UCO family, members of the division of Information Technology strive to uphold the university’s shared values of Civility, Character, and Community. We have developed our Code of Ethics with these values in mind.
In order to assure data integrity and network security, the Office of Information Technology at the University of Central Oklahoma has taken measures to ensure that information can only be accessed or modified by those authorized to do so. Procedures have been implemented to protect data integrity from environmental hazards as well.