Skip to main content

IT News

Defend your data: Don’t store personal tax information on any WVU computer

Information Technology Services has found roughly 3,800 personal tax returns and 800 W2 forms, including Social Security numbers, stored on some 700 WVU-owned computers. Storing this data is a violation of WVU policies and creates the risk of having your personal information compromised. To protect your privacy and keep your financial and banking information private, do not save this data on any University machine.

Read Full Article

Researchers can now submit internal grant applications through WVU+kc

WVU researchers applying for Research and Scholarship Advancement (RSA), Community Engagement, and Faculty Travel/Development grants should submit applications through the new Internal Grants module of the electronic research administration tool WVU+kc.

Anyone who logs into WVU+kc using a Login username and password can create an internal grant by clicking on the “Create Internal Grant” link from the menu bar. No additional access request is required.

Read Full Article

ITS restricting what student information is publicly accessible in the WVU Directory

To better protect students’ privacy, Information Technology Services will be removing home addresses and phone numbers from the WVU Directory as of Monday, Jan. 30. The directory may be momentarily unavailable while this change is being made.

Anyone seeking student college, major and email addresses will have to verify their current employee and/or student affiliation with the University by entering their WVU Login credentials.

Read Full Article

ITS accepting public comment on identity and access management policy until Feb. 9

Information Technology Services welcomes comment on a new Identity and Access Management policy that would require the use of WVU Login credentials across all University-owned machines and systems used by faculty, staff and students. Centrally supported authentication credentials help prevent unauthorized electronic access to information, systems and applications, as well as potentially fraudulent activity.

Read Full Article