Search48 Results

The Office of Information Technology is committed to protecting the University of Central Oklahoma; its students, faculty and staff; and its partners from knowingly or unknowingly using technology illegally or through damaging actions. The complete list of policies, guidelines, and procedures regarding the protection and security of technological information that will serve as the University’s standards is listed within this article.
Access to UCO IT systems and software must be requested via the Employee Security Access Form
Provides details about UCO's policy and recommendations for password security.
All UCO Faculty, staff, students and contractors are responsible for protecting the university data they access or use within the scope of their employment and must comply with the UCO Information Security Policy. The Data Classification Guide applies to all devices used to access university data including university owned and managed computers as well as personal devices (tablets, Smartphones, thumb drives).
If you would like to request to have your Display Name* changed at the University of Central Oklahoma, you can submit this request along with the following documentation (licenses, Social Security Card, etc.). These items can be given to the Alumni Relations Office in Evans Hall, Room 101.
The Safe Attachments security feature in Office 365 ensures that all potentially malicious email attachments are automatically executed in a virtual sandbox environment, allowing Microsoft to identify and block harmful attachments without any risk to UCO.
In order to assure data integrity and network security, the Office of Information Technology at the University of Central Oklahoma has taken measures to ensure that information can only be accessed or modified by those authorized to do so. Procedures have been implemented to protect data integrity from environmental hazards as well.
The Responsible Use of Technology policy outlines appropriate use of computers, printers, fax machines, and other technology hardware, software, and the network on which all are connected.
OIT has implemented FortiMail to assist with the evaluation of incoming and outgoing email messages for potential threats. A separate quarantine space has been created for each unique UCO email address and messages that have been identified as potential spam will be routed to that address's quarantine. This article provides information on managing the emails that are sent to quarantine including how to release that email to your inbox.
Microsoft Defender Antivirus is installed on UCO-owned machines by default.