Information Technology is associated with developing, studying and designing the information related to computers. Incompletes – If a student has an incomplete and needs access to one of your courses contact the Technical Support desk at 402.554.4357 or [email protected] Information needed is students name and NUID along with the course number, section number, and term.
Security policies and procedures are essential for implementing IT security management: authorizing security roles and responsibilities to various security personnel; setting rules for expected behavior from users and security role players; setting rules for business continuity plans; and more.
The Information Technology Infrastructure Library v3 state the management technology information infrastructure as a combined set of software, facilities, hardware, and networks so as to test, develop, monitor, deliver, control and support IT services.
Such complexity reduction is critical to identifying, prioritizing and focusing organizational resources on high-value assets that require increased levels of protectionâ€”taking steps commensurate with risk such as moving assets to cloud-based systems or shared services, systems and applications.
Our overall goal is for the University COMMUNITY to view ITS as a partner in the University’s overall success, as a leader in encouraging innovation and improving services while reducing costs and as COLLEAGUES committed to delivering great customer service in everything we do. Our projects and activities support the University’s overall goals of student success, research, and creativity, access and diversity, partnerships, campus culture and service excellence, and fostering a sense of place.