Eastern Illinois University Logo
ITS |

Employee Technology Guide

ITS Home

I Need Some Help

IT Services

Security Services

Forms

Publications

PantherCard

Technology Initiatives & Investments

Contact Us

Employee Tech Guide


ContentsPrintable Version (PDF)

(Click on the topic to navigate to that page)

 

How to use this guide


Eastern Illinois University is committed to providing the resources and services necessary to keep its employees on the leading edge of technology. To enhance the working and teaching environment, this guide is a reference for accessing various technology services.

Back to Top


Campus Technology Support


The Help Desk, located in the basement of the Student Services Building, is able to give you live, local assistance with all of your technology questions. You may contact the Help Desk by phone at 581-HELP (4357), or by visiting in person. Staff members are able to answer how-to and troubleshooting questions on a variety of computer- and connectivity related issues and assist you with password and software problems, as well. You also may email your issue to: itshelp@eiu.edu 

When contacting Campus Technology Support, be prepared to provide the following information:„

  • Full name and university E-number
  • „NetID
  • „Computer tag number
  • „Building and room number
  • „Email address
  • „Telephone number
  • „Full description of the problem and nature of error message
  • „Sequence of commands and responses

LogMeIn

Information Technology Services now uses an application called LogMeIn to speed service calls on faculty and staff desktop computers. 

LogMeIn allows Help/Service Desk service technicians to remotely access your computer and make needed software fixes, updates, virus cleanups, program repairs, etc., saving time and speeding resolution of your situation. Your machine must have a network connection. You, the user, must grant access to your computer, and you retain control at all times and may terminate the session at will. LogMeIn is Web-based, and no software need be downloaded onto your computer. A Help/Service Desk technician will guide you through the process if you agree to participate in a LogMeIn session.

Back to Top

 

Your identity


E-number

Your E-number is your essential means of personal identification at Eastern. To protect against identity theft, the university limits the use of Social Security Numbers, substituting a nine-digit proprietary e-number instead. This number can be found on your Panther Card. Use it to identify yourself in all communication with Campus Technology Support.

NetID

Every Eastern employee is assigned a NetID. Your NetID is the same as your EIU e-mail address, without the “@eiu.edu” suffix. Your NetID is a combination of your initials and last name and possibly a number. For example, if your name is John Q. Employee, your NetID might be “jqemployee.” If you don’t know what your NetID is, search for yourself in Eastern’s Web page phone book. Find your entry and click on “Additional Information.” Your NetID will be listed in the pop-up window:

Back to Top

 

PantherMail


Eastern’s employee email system, known as PantherMail, is the official communication channel for all academic and university notices. You should check your account regularly. Failure to use and check your PantherMail can result in missed messages.

Eastern will use your employee email for all correspondence relative to your job. It is your responsibility to ensure that your PantherMail account is checked regularly and that it has sufficient free space to receive university communication.

Accessing your PantherMail

In order to use PantherMail, you will need your NetID. Eastern employees are assigned a NetID when they are first hired. If you need assistance with your password, you may call the Help Desk at 581-HELP (4357). When you call you will be asked your e-number and/or your personal identification questions if you have already reset your password.

The easiest way to view your PantherMail is via the secure Web interface located at www.eiu.edu/panthermail. All you need is a computer with an Internet connection and a Web browser. No configuration is necessary. Simply enter your NetID and password in the spaces provided in order to get started.

Official email verification 

Phishing scams continue to target university email accounts. Everyone needs to be on the lookout for suspicious emails asking for username and password information. It only takes one or two people to fall victim to a phishing scam to negatively affect the delivery of campus e-mail.

Some quick tips to avoid becoming a phishing victim:

  • „ Never respond to an email asking for password information.
  • „ Check the URL before clicking on odd looking messages to make sure it’s    really .eiu.edu
  • „ Always make sure the URL ends with eiu.edu.
  • „ If in doubt, call 581-HELP for advice.

Eastern maintains a website that will tell you if an email that you have received is actually from Eastern. If you receive an email purporting to having been sent from the university and you are suspicious about its nature, go to User Services. If the email is listed there, it is safe to open.

Back to Top

 

PAWS


Find your employee information on PAWS

PAWS (Panther Access to Web Services) is an online application that enables employees to access a variety of information via the Internet. All you need is a computer with access to the Internet and a Web browser.

Through PAWS, users can securely

  • „ Look at payroll records and pay stubs
  • „ View leave reports and balances
  • „ See W-2s and tax data
  • „ Pay university bills
  • „ See records and transcripts
  • „ Obtain your automobile parking pass

From the main EIU home page, click on the PAWS link in the upper right corner.

You will be taken to the following page:

PAWS

Login to PAWS. You will need your NetID and password:

PAWS2

Click Here for more information 

 

Laptop security 

There are enough threats to contend with when you are working on a workstation on a hard-wired network. When you work wirelessly, with a laptop, there are even more problems to deal with. Chief among them are physical theft and sniffing.

Because a laptop is completely portable, it can easily be lost or stolen. Remember, if you can carry away your laptop, someone else can, too. Never leave your laptop unattended. If you have to leave your office, lock your door or put your laptop in a locked desk. Never leave a laptop in a car.

You should be especially careful not to load sensitive files on a laptop, particularly those containing personal information concerning identity such as names, Social Security Numbers, phone numbers, ages or addresses, or proprietary fiscal information.

Back to Top

 

VPN for Remote Desktop


When using a laptop on a wireless network, you run the risk of having your data intercepted. A wireless signal is merely a radio signal, and it can be compromised by persons wishing to steal information or cause harm. You can void such threats by connecting through Eastern’s AnyConnect Virtual Private Network, or VPN, when working on university business on a wireless laptop, or from home on a desktop computer.

Following are instructions/help for Eastern employees.

The PC you want to remote into (your office PC) must accept Remote Access. First, click Start at the bottom of your screen and go to My Computer and right click, then left click on Properties. When you see the System Properties box, click on the Remote tab and check the bottom box. Make sure to hit Apply after you check the box:

System Properties

From this screen you can also write down the full computer name. You need this fully qualified name to remote into your PC. You also must be the local administrator of the PC.

To download the VPN client to your off-site or wireless PC, go to the ITS website. Click on Software Downloads, then on VPN and choose Windows or Mac:

Software Downloads

For Windows operating systems, you will see the following screen. Click on the “AnyConnect Installer” link and follow the instructions.

Software Downloads 2

When you complete the process you will have a VPN tunnel in to the campus network. Note: If your system is idle for 30 minutes, your VPN session will time out and close. Also note: You should click Disconnect when finished to end the VPN session.

For Mac operating systems, you will see the following screen. Click on the “AnyConnect Installer” link and follow the instructions.

Software Downloads 3

Back to Top

 

Wireless connectivity


Using the wireless network

The wireless network at Eastern, called “eiuwifi,” allows notebook computers and some handheld devices to connect to the campus network using wireless/radio frequency technology rather than via traditional Ethernet cable. 

The advantage of the wireless network is that it allows for mobility. Using a wireless-capable notebook allows you to access the campus network from locations that do not have traditional network connections, such as common areas, lounges and outdoor areas.

When purchasing a notebook computer, make sure you purchase one with an internal wireless card meeting 802.11n (preferred) or 802.11g (acceptable) specifications. Information Technology Services has provided wireless access points throughout every academic building and residence hall common area on campus. These are listed in this guide.

Caution: Wireless not encrypted

Wireless Internet access at Eastern is neither secure nor encrypted. Use of the wireless network for anything other than general Web browsing is not recommended. You should never send sensitive data such as Social Security Numbers over the wireless network.

Wireless authentication procedure for laptops

University faculty and staff must obtain access to the wireless network by logging in with their EIU username and password, just as they do with their desktop machine or to log into their e-mail account. Guests on campus have a similar log-in process.

Benefits to the university include better protection against virus infections, control of illegal peer-to-peer file sharing and greater ability to detect malicious activity on the network.

Users of Eastern's wi-fi network should be aware that the network remains unencrypted, and they should never transmit sensitive data such as personal financial information or Social Security Numbers unless they are logged in to the university's VPN remote desktop application.

Faculty/staff authentication for wireless access:

After you establish a wireless connection and open an Internet browser, you will see this screen. Enter your NetID and password and click submit. Your laptop now will be able to function on the Eastern network. If you don’t have a NetID and password, click the “Register as Guest” button instead:

SafeConnect

If you click the Register as Guest button, you will see the Network Guest Appropriate Use Policy. Guest users should review the policy, then enter a valid personal e-mail address, first and last names and click submit:

SafeConnect2

If you accidentally click the guest button, then realize that you do have a NetID and password, click “Log in with EIU Account” to return to the standard EIU credentials logon screen.

Every first-time connection will be presented the next screen:

SafeConnect3

You will need to review the usage policy if you haven’t yet done so and agree to install the policy key client. This will occur only for machines that do not yet have the policy key client and which are logging on for the first time. If you click “I do not accept,” the client will not be installed and your computer will not have access to the internet.

Once the policy key client is installed, the machine will have wireless internet access.

Faculty and staff who install the policy key client will have 30 days of wireless network access before having to login again.

Guest authentication for wireless access:

Guest users must self-register to get a guest ID and password to be used for all future wireless sessions. The ID and password expire after one week. For example, “Guest Bob” visits campus on a Friday evening, using wireless self registration, installing the policy key client and accessing the wireless network. Later, he shuts down and goes home. He returns Saturday with his same laptop and reconnects to the wireless network. He will then have to self-register again as guest. Assuming he did not uninstall the policy key, he will be granted access. If, for some reason, he did uninstall the application, he will have to reinstall it.

Macintosh anti-virus requirements

Once a month, wireless Apple Macintosh users at Eastern will see the following notice informing them that ITS is bringing Macintosh security requirements up to the level already required for Windows machines. ITS offers a free Symantec AV download for students/faculty/staff to install:

SafeConnect4

Wireless availability on campus

All administrative, academic areas and residence halls on campus are covered by a wireless signal. Your reception may vary by location and network traffic loads.

Back to Top

 

Safe computing


There are a number of steps that you can take to help protect your privacy and ensure the safety of your own computer.

Phishing attacks

Remember: ITS will never ask you for your password via email. If you receive an email asking for your password or other personal information, do not respond, and instead, contact the Help Desk at 581 HELP (4357).

If you receive an email that you feel is a phishing attempt, please forward the email to the following address: phishing@eiu.edu

If your email account has been identified as compromised, ITS will lock your account. Once locked, you will not be able to access your email. To resolve this lockdown, you must call Campus Technology Support at 581-HELP to reset your password and unlock your account.

Identity theft

Identity theft is one of the fastest growing crimes. However, you can take steps to minimize the risk of becoming a victim.

What is identity theft?

Identity theft happens when a criminal steals a victim’s identifying information and uses it to get credit, debit cards, apply for bank loans and even steal money from existing accounts. Most victims find out that they have been taken advantage of when they apply for a loan or when creditors call trying to collect on the debts the criminal racks up.

How does identity theft happen?

Identity theft is fairly easy to commit; all that is needed is a Social Security Number, name, birth date and possibly other identifying information such as an address. 

Ways to prevent identity theft

  • Password-protect sensitive information with non-dictionary passwords and change the passwords frequently (30 days is recommended).
  • Shred documents that contain personal information.
  • Do not use Social Security Numbers as a form of identification.
  • Don’t give out your Social Security Number.
  • Check your credit regularly. 

Lock your computer

If you are going to be away from your computer for a while, make sure it is locked. This will require you to re-enter your password before you can use your computer again. To perform this task on PCs with Windows operating systems:

  • „On your keyboard, press Ctrl+Alt+Delete at the same time, then click Lock Computer.
  • „To unlock your computer: Press Ctrl+Alt+Delete again, then type your password in and click OK.


Reporting a problem

If you suspect that someone has guessed your password and accessed your account, change your password immediately. If you suspect that there is a security breach or flaw in the university system, please notify Campus Technology Support at 581-HELP.


More information about security is available from Eastern’s IT security officer, Mike Gioia, 581-1942, or on ITS Security

Back to Top

 

Passwords


You must create a password to use in conjunction with your NetID in order to access your university accounts. You should choose a password that would be difficult for others to guess, keep it secure and change it occasionally. Never share your password; remember, you are responsible for all activities tied to your account.

When creating a password, choose one that is easy for you to remember but hard for others to solve. Password security, however, does not end with picking a strong password. In order to ensure full password security, you must also take steps to protect your password.

  • Never share your password with anyone: It is against university policy to do so. This includes family, friends, significant others, computer support personnel and supervisors.
  • „Never save your password if prompted by your browser or any other programs.
  • Avoid writing your password down.
  • Never send your password in email, even if the request looks official: Not only is it against university policy, but such requests are most likely phishing attempts.

Strong password rules:

  • „ The first character of your password must be alphabetic.
  • „ Your password must be a mix of upper and lower case letters.
  • „ Your password must contain at least one number.
  • „ Your password must be at least eight characters long.
  • „ Your password must contain at least one special character from the    following list: ! % * - ? :
  • „ Your password may not be longer than 15 characters total.

You should change your password regularly. To change your password, go to
password.eiu.edu, where you will see the following screen, and follow the instructions there:

Password

Back to Top

 

Operating system updates for Windows and Mac


One of the most important steps you can take to implement additional security is to keep up to date with current software fixes and service packs. It is recommended that you set the updates to check daily and to automatically download recommended updates and install them.

Updating Windows 7

Keeping computer operating systems updated is an important step in making sure the computer is secure and continues working at its best. Operating system updates not only fix known security problems but also correct operating problems and sometimes will add new features aimed at making sure users are able to take full advantage of their computer.

All computers that are part of the EIU domain are set to automatically download new updates when they become available. To ensure that your computer receives the latest update, make sure that you restart your computer at least once a week. For example, shutting down over the weekend will help make sure that your computer installs its updates when you come back to work on Monday. To help EIU conserve energy, think about shutting down your computer every night.

However, while Eastern-owned computers should automatically download updates, you can check to make sure your Windows 7 computer is up-to-date by following the instructions below. 

Launch Windows Update:

To start the Windows Update procedure in Windows 7, you will need to open Internet Explorer, open the Safety menu and select Windows Update.

Alternatively, you can open Windows Update by clicking on the start menu, typing in Windows Update and clicking on the Windows Update program.

Once you select Windows Update from either of the options above, Windows Update will open in a new window.

Downloading and installing Windows 7 Updates:

Once open, Windows Update will inform you if there are any available updates for your computer. If no updates are available, you can still check for updates by clicking “Check online for updates from Windows Update.”

To begin installing updates that are available, simply click on the Install Updates button.

Once all updates and patches have been installed, the Windows Update window will inform you that the installation was successful and you may be prompted to restart your computer. If this is the case with your updates, save your work and restart you computer as soon as possible. Updates are not applied until after the computer restarts.

Alternatively, if your computer installed the updates in the background you may receive a message by the system clock informing you that updates were installed and your computer needs to restart.

When you restart your computer, Windows will install and configure the pending updates. Make sure that you allow your computer to properly install these updates as interrupting this process may result in damage to the operating system and/or loss of information.

Updating Apple OS X

Keeping computer operating systems updated is an important step in making sure the computer is secure and continues working at its best. Operating system updates not only fix known security problems but also correct operating problems and sometimes will add new features aimed at making sure users are able to take full advantage of their computer.

Unlike Eastern-owned Windows computers connected to the domain, Apple OS X desktops and laptops used by faculty and staff do not receive updates automatically. Therefore, it is vital that faculty and staff using Apple OS X computers run Apple’s Software Update at least once a month to ensure these computers download and install the latest security patches, operating system updates and Apple software updates.

For information on how to update your Apple OS X desktop or laptop, see the instructions below. 

Launching Software Update:

To open Software Update, you need to click on the Apple menu (located at the upper left of the screen) and select Software Update.

Once you have selected Software Update. from the Apple menu, the Software Update program will open and begin looking for updates available for your Apple OS X computer.

Once all available updates have been found, Software Update will show you a list of all updates that need to be installed.

Downloading and installing Apple OS X Updates:

Once you have opened Software Update you will need to select the updates to install. It is recommended that you apply all updates listed. Note that many of the updates may require you to restart your computer. To install the selected items, simply click Install [#] Items.

After clicking on the Install button, Software Update will prompt you to enter your username and password. You must have administrative rights to your computer for Software Update to run properly. If you do not have administrative rights, contact your ISS or the Campus Technology Support for assistance.

Once you have entered your password and agreed to any license agreements required by the selected updates, Software Update will begin downloading and installing the updates.

After all of the selected updates have downloaded and installed, you may be prompted to restart your computer. If this is the case with your updates, save your work and restart your computer as soon as possible. Updates are not applied until after the computer restarts.

Back to Top

 

Dealing with threats and safety issues


Know the potential threats:

  • Hacking: Malicious individuals may exploit the security breaches in your computer software in order to steal your personal information such as passwords and credit card numbers. Hackers may also attempt to secretly install programs on your computer designed to abuse your Internet connection.
  • „Malware: Malware is a term used to describe any kind of malicious software that proves detrimental to your computing experience, such as viruses and worms.
  • Viruses: Computer viruses are programs that install themselves onto a computer for the purpose of damaging computer files and copying themselves to other computers.
  • Worms: Computer worms are typically installed when a user opens an infected e-mail attachment or clicks on an Internet link to an infected Web page. Worms scan electronic address books on your computer for the purpose of sending copies of themselves to other people.
  • Adware: Adware programs are installed on your computer for the purpose of displaying advertisements in separate pop-up windows.
  • „ Spyware: Spyware programs utilize your machine resources and Internet connection in order to relay information about your Web browsing habits to a parent company.

Solutions

  • „Symantec Endpoint: Installing Symantec anti-virus software on your computer will keep it from being infected by computer viruses, worms, adware and spyware. When you install Symantec on your computer, it will be configured to automatically update its malware capturing engine about once a week in order to recognize new computer viruses as they are discovered and reported to Symantec. ITS has made this program available free of charge. A copy can be downloaded at its.eiu.edu/software.php
  • „Spam filtering: ITS has implemented an e-mail tool on the campus network to filter spam. This application identifies spam e-mail, then tags it as such in the subject line, making the recipient aware of its nature. In addition to tagging spam, this application can filter out threats before they reach your in-box. This program is already running on your campus e-mail account and does not require your intervention.

Web privacy

Eastern uses standard Web server access logs and only gathers information on the time of day, IP address of the accessing Web browser and URL for the purpose of measuring system performance. In compliance with the Illinois State Agency Web Site Act, Eastern websites do not use permanent cookies or any other invasive tracking programs that monitor and track website viewing habits. Eastern websites may, however, use transactional cookies (session variables) that facilitate business transactions. While Eastern uses transactional cookies to track your visit to eiu.edu, and our Web server automatically logs the IP/Internet address of your computer, this information does not identify you personally, and you remain anonymous unless you have otherwise provided personal information.

Although Eastern’s Web pages provide links to other websites, both government and nongovernment, Eastern is not responsible for the privacy practices or the content of such external websites. If you link to another site, you are no longer on a site covered by this privacy notice.

Harassment issues

Do not use university computing facilities to harass anyone. This includes the use of insulting, obscene or suggestive email or postings, tampering with others’ files and invasive access to others’ equipment. Email harassment violates ethical usage of your computer account and may result in university disciplinary action or criminal charges.

Mass mailings and junk e-mail

Never send uninvited email to large numbers of strangers (known as “spam”). In particular, do not send commercial advertisements, surveys, chain mail or questionnaires to anyone who has not given you their permission to do so. Junk e-mail wastes both system resources and the time of those who receive it, and recipients may contact your system administrator with complaints.

Unauthorized use of accounts

Avoid accessing an account not specifically authorized to you, whether that account is on an Information Technology Services system or one at another place. Avoid using an account for a purpose that is not authorized when the account was established, including for personal and commercial use.

Don’t engage in computing activities that are designed to invade the security of accounts. Attempts to decipher passwords, to discover unprotected files or to decode encrypted files are examples.

Proper usage standards require that everyone take prudent and reasonable steps to prevent unauthorized access.

Unauthorized use of software

Do not make unauthorized copies of licensed or copyrighted software. Do not make copyrighted or licensed material accessible from a Web page without the specific written permission of the copyright owner.

Avoid actions that are in violation of the terms or restrictions on the use of software defined in official agreements between the university and other parties.

Examples include the copying of software from personal computers unless it is clearly and specifically identified as public domain software or shareware that may be freely redistributed and the copying of restricted Unix source code.

Enforcement

When instances of improper use come to its attention, Information Technology Services will investigate them. During those investigations, Information Technology Services reserves the right to access private information, including the contents of files and mailboxes, while making every effort to maintain privacy. Those investigations that discover improper use may cause Information Technology Services to:

  • „Limit the access of those found using facilities or services improperly.
  • „Refer flagrant abuses to deans, department heads, the responsible vice president, the university police or other authorities for appropriate action.
  • Disclose private information to other university authorities.
  • „Users who violate this policy may have their computing privileges terminated and may be subject to disciplinary action by the university in accordance with appropriate policies or judicial affairs procedures.

Back to Top

 

Computer use policies


Information Technology Services provides computing facilities and services for the legitimate instructional, research and administrative computing needs of the university. Proper use of those facilities and services supports the legitimate computing activities of Eastern students, faculty and staff. Proper use respects intellectual property rights.

Legitimate instructional computing is work done by an officially registered student, faculty or staff member in direct or indirect support of a recognized course of study. Legitimate research computing is work approved by an authorized official of a university department. Legitimate administrative computing is work performed to carry out official university business.

Intellectual property rights begin with respect for intellectual labor and creativity. They include the right to acknowledgment, the right to privacy and the right to determine the form, manner and terms of publication and distribution.

Proper computing use follows the same standards of common sense and courtesy that govern use of other public facilities. Improper use violates those standards by preventing others from accessing public facilities or by violating their intellectual property rights. Therefore, the basic policy of the university on proper use is:

  • Any use of Information Technology Services facilities or services unrelated to legitimate instructional or research computing is improper if it interferes with another's legitimate instructional or research computing.
  • „Any use of Information Technology Services facilities or services that violates another person’s intellectual property rights is improper.  
  • „Any use of Information Technology Services facilities or services that violates any university policy, any local, state or federal law or which is obscene or defamatory is improper.
  • „Any use resulting in commercial gain or private profit (other than allowable under university intellectual property policies) is improper.
  • „Please refer to our Policies for the complete version of the acceptable use policy.

Back to Top

 

Panther Card


Your Panther Card is an essential, multi-functional tool necessary for many of your daily activities on campus. Your Panther Card provides the combined functionality of identification and purchasing, all in one card. If you do not yet have a Panther Card, visit the Panther Card office, located in Room 3040 of the Student Service Building.

PantehrCard

Lost or stolen cards, chip malfunction
Should your Panther Card be lost or stolen, or your card’s smart chip malfunction, contact the Panther Card office only.

Back to Top

 

PantherFile


PantherFile is a secure, Web-based file-storage system that has is available to staff and faculty at Eastern. PantherFile allows users to access files for uploading, storing, retrieving, and sharing. Files can be easily and securely accessed over the Internet from any location.

A standard 5gb of space will be allocated to each faculty and staff individually. Individual allotments of space will not be available to users until the individual has completed the online training session.

Click here to access PantherFile. To use your PantherFile account, you must first create it and view a training video. These are accessible from the left side of the PantherFile page:

PantherFile

 Back to Top

 

Other technologies


Computer repair

Eastern offers a repair service on campus for personal computers through Advanced Microelectronics Inc. AME does warranty work on both PC and Macintosh computers. AME does non-warranty work on the same models, plus Dell computers. Equipment must be dropped off at the ITS Help/Service Desk satellite branch in the basement of the Student Service Building. Fees start at a minimum of $65.

Bookstore discounts

Faculty and staff may take advantage of educational discounts on computers and software at the University Bookstore, located in the Martin Luther King Jr. University Union. Printers, cables, flash drives, security cables and other technology products are also available. See www.eiubookstore.com for more information.

Telecommunications

The EIU Telecommunications Office provides all on-campus phone-related services for administrative customers. The office is located in Room 3040 in the Student Services Building (north of MLK Union), for assistance with your on-campus phone services.

Computer acquisitions

Faculty and staff can purchase EIU computers with the assistance of Information
Technology Services. Access Dell’s or Apple’s sites from the EIU Bookstore or Purchasing websites for special pricing for Eastern. Check to see if you need a new LAN drop or face-plate.

If ordering Windows, choose the lowest cost option, such as Home Basic. ITS will then load Eastern’s version of Windows onto the machine.

Don’t purchase Office software, as Eastern’s Campus Agreement allows for downloading.

If you have additional configuration questions, please email the Help/Service Desk at itshelp@eiu.edu.

New computer pricing

  • Dell
    • Under “Set up your Dell Profile,” contact Connie Downey in Purchasing via e-mail cedowney@eiu.edu, to set up your Dell profile.
    • You will be redirected to the EIU Dell site where you will be able to select the machine you need. Here you will find ITS-recommended models.
    • Select the item you are interested in from the menu or the page.
    • Customize the item as desired.
    • Click “Save as e-Quote” at the bottom of the page
    • Fill out the information as requested and as prompted.
  • Apple

Ordering software

Order software at the time your computer is purchased, or later through your department.

LAN drop and face-plate information

Facilities Planning and Management has an installation charge for each new faceplate, so be sure there is not an available faceplate behind a bookcase or hidden elsewhere in the room. The following information must be provided:

  • Building
  • „Room number
  • „Contact person
  • Contact’s email
  • Billing account

Have the request approved by the department head. Call the Help/Service Desk at 581-HELP if needed.

Requests to clean hard drives 

Requests may be made online at: http://its.eiu.edu/Request2.pdf

Please provide the following information:

  • „Reason
  • Change of users (dean, director, chair)
  • Other (specify)
  • Unit to be cleaned
  • Name of PC’s prior user
  • Department/building/room number
  • Requestor information
  • Person requesting erasure
  • Phone number
  • Date requested for erasure
  • Department

For record retention:

  • „Unit is backed up to
  • „Date backed up
  • Person responsible for backup

Before any unit can be cleaned, it must be backed up to a shared drive or other electronic media, and the signature must be obtained to ensure no information is lost for auditing/litigation purposes. 

Supervisor’s approval (person authorizing erasure) also is required.

Please call the Campus Technology Support at 581-HELP with any questions about this procedure.

Sending computers to surplus

Contact university movers to move computer from user location to the ITS scrubbing area. Go to the Facilities Planning and Management website and fill out an electronic moving tag  https://webappsprod.eiu.edu/eiuwebapps/PROD/PropertyControl/pclogin.php

Units will be updated in inventory, hard drives will be scrubbed and scrubbed surplus units will be moved to warehouse or then redeployed to new user or sent to CMS in Springfield.

To obtain a surplused computer, contact Ron Mathenia at Property Management 581-7111. You must fill out a moving tag to send a computer to surplus.

Back up your files 

Equipment and software can fail. To avoid losing important data and work, you should back up your files. The safest place you can keep critical data files is on a network server. (Remember, if you back up data on a CD or portable drive, you run the risk of theft or loss.) Not all employees at Eastern have access to network servers, however. Consult your department’s instructional support specialist to learn if you have access to network storage. Be particularly careful about backing up sensitive data on portable, plug-in “thumb drives” as these can be easily lost or stolen.

ATAC

The Academic Technology Advisory Committee (ATAC) provides a university wide forum for discussion of technology issues and the development of recommendations for strategic direction concerning the use of academic communication, computation, information and instructional technologies. The funding is provided by the student Computer Technology Fee and is dispersed by ATAC to provide equipment, software and services for the technology enhanced classrooms and computer labs in order to enhance the learning of the students attending Eastern.

ATAC has subcommittees, ad-hoc committees and task forces as deemed necessary. The standing subcommittees are (1) Academic Technology and Instructional Support, which provides a practical, problem-solving forum for instructional support and technical support staff; (2) Student Technology Fee, which makes prioritized criterion-referenced and standards based recommendations for the use of revenue derived from the computer technology fee; and (3) Coordination of Technology Resources, which reviews the process and make suggestions for coordinating efforts relative to the selection, purchase, delivery, and installation of technology resources for campus programs and technology initiatives on campus. 

ITAC

The primary mission of the Information Technology Advisory Committee at Eastern Illinois University is to provide advice and consultation on information technology to the vice president for Business Affairs as well as serving as a regular advisor to the assistant vice president for ITS.

The committee examines technology issues (both local and global); provides input and reviews strategic plans; recommends priorities for IT initiatives; provides leadership and recommendations regarding enterprise level technology-related matters; provides direction and recommendations for the coordination of technology-related efforts for the university and is a liaison to the EIU community concerning matters relating to information technology.

Twitter

Follow User Services’ Twitter feed to keep current on service outage announcements and other information: https://twitter.com/eiu_itshelp

Back to Top