Search66 Results
- Knowledge Base
- Policies & Procedures
- Acceptable Use
The Responsible Use of Technology policy outlines appropriate use of computers, printers, fax machines, and other technology hardware, software, and the network on which all are connected.
- Knowledge Base
- Help & Training
View the full technology training catalog from the TRC. Custom and one-on-one trainings available on request.
- Knowledge Base
- Request for New Technology
The Central Tech Store is the primary source for technology hardware and accessory purchases at UCO. All individuals and departments looking to purchase technology hardware or accessories (including batteries, power cords, adapters, etc.) will need to follow the information and steps outlined in this article.
- Knowledge Base
- Academic Technologies
- Instructor Resources
After months of research and evaluation as well as the contributions of a user evaluation team, the Enterprise Mirroring Project team makes the following recommendation regarding technologies for use in mirroring devices to screens in classrooms and meeting spaces at UCO.
Two products were identified as potential solutions for use in mirroring technology-related projects/requests.
- Knowledge Base
- IT Projects
- CUIT Projects and Priorities
- UCO Call For Technology Projects
The 'Call for Projects' will provide the university a more efficient and effective process to moves projects from request through implementation. This article provides a summary of the process and workflow.
- Knowledge Base
- Request for New Technology
IT projects can be complex and require a great deal of planning and coordination. OIT has a team of experienced professionals who can help you with all aspects of your IT project, from planning and design to implementation and support.
- Knowledge Base
- Policies & Procedures
- Acceptable Use
The University of Central Oklahoma has the responsibility for securing its computing and networking systems (both academic and administrative) against unauthorized access, while making the systems accessible for legitimate academic and administrative uses.
- Knowledge Base
- Academic Technologies
- Student Resources
Description, restrictions, and links to Assistive Tech (AT) software including built-in AT features in existing software and operating systems. For all staff, students, and some available to general public.
- Knowledge Base
- Request for New Technology
Outlines the differences between EULAs, ToU agreements, and T&Cs. EULAs, ToU agreements, and T&Cs. All are legal agreements that outline the terms and conditions under which a user is allowed to use a product or service.
- Knowledge Base
- Request for New Technology
Technology Questions for Software Vendors
- Knowledge Base
- Classrooms & Computer Labs
Having trouble with your classroom or building technology? Contact your building tech for onsite help/assistance!
- Knowledge Base
- Policies & Procedures
- Enterprise Information Security
The Office of Information Technology is committed to protecting the University of Central Oklahoma; its students, faculty and staff; and its partners from knowingly or unknowingly using technology illegally or through damaging actions. The complete list of policies, guidelines, and procedures regarding the protection and security of technological information that will serve as the University’s standards is listed within this article.
- Knowledge Base
- Policies & Procedures
- Network & Communication
The Office of Information Technology at the University of Central Oklahoma has developed a checklist to be used when creating digital media to make technology more easily accessible for individuals with disabilities of all ages.
- Knowledge Base
- Policies & Procedures
- Governance & Advisory
As a member of the UCO family, members of the division of Information Technology strive to uphold the university’s shared values of Civility, Character, and Community. We have developed our Code of Ethics with these values in mind.
- Knowledge Base
- Policies & Procedures
- Enterprise Information Security
In order to assure data integrity and network security, the Office of Information Technology at the University of Central Oklahoma has taken measures to ensure that information can only be accessed or modified by those authorized to do so. Procedures have been implemented to protect data integrity from environmental hazards as well.