If you experience any issues with PGP, please report them to the help desk, AskIT, by email at AskIT@uab.edu" target="_blank">AskIT@uab.edu, or by phone at 205-996-5555.  Please be sure to provide the following information:

  • Issue/symptoms
  • Error messages
  • Computer make and model
  • Internet connection type
  • PGP installer version
  • Estimated time of occurrence (if possible)

Common Solutions to Installation Issues

  1. Verify that you are an administrator of the system on which you are attempting to install PGP. 
  2. Open your web browser and ensure that you have Internet connectivity by opening a website.
  3. Be sure that you have a current installation package for PGP Desktop.  Visit www.uab.edu/it/software for the latest installation files.
  4. Ensure that you are using your BlazerID and strong password for the PGP Enrollment credentials.

Common Solutions to Password Related Issues

  1. Verify that Caps Lock is not on while authenticating.
  2. If you recently changed your account password, you may have to provide the old password until you log in to the system with your new password.
  3. If the previously mentioned steps do not resolve your issue, you should call the AskIT Help Desk to request a PGP recovery token for the system or portable device.  A recovery token is a one-time password that will allow you to bypass PGP, but it will not bypass the operating system password; you are still required to log in.

Common Solutions to Boot/Startup Related Issues

  1. Ensure that a keyboard is connected to the system.  Systems such as tablets without physical keyboards will not be able to authenticate on the PGP boot screen.
  2. Remove any CDs, DVDs or USB drives from the system.  Many of these devices have features that allow them to start before the system hard drive.
  3. Does the system have multiple operating systems or Dell Media Direct?  If so, then you will need to contact your support personnel to assist you with the recovery of your hard drive.  Please note that PGP should never be installed on systems with multiple operating systems, as it will render the system inoperable.
  4. See the PGP Recovery documentation for further support.

 

This page summarizes all of the online request form links available for services provided by IT.  To inquire about services not listed contact AskIT (uab.edu/askit or email askit@uab.edu). 

Communications
  • Usage toward UAB email and UABFile
  • Request changes to your email service

 

  • Request a BlazerID and password
  • Change an existing password
  • Set up a personal web space 

 

Mass Email Requests
  • For one-time messages addressed to multiple recipients that need to be sent from a "special" address. More information about requirements and the overall process can be found here.
  • Direct link to the request form: https://hatteras.dpo.uab.edu/memf/
 
  • Request a new user account (mailboxes, file storage, imaging systems or WebIT)
  • Delete or modify and existing account (access to mailboxes, file storage, imaging systems or WebIT)
     
  • Sponsors and guests can set up guest user accounts to access a myriad of UAB systems and services

 

Online Learning/Blackboard Course changes
  • Request that courses in the Academic Institute be updated - courses can be cross listed; opened or closed; assigned instructors, designers or teacher's assistants; or have previous content imported to them - https://www.uab.edu/it/instech/auth/acad_form.html

 

Information Security
  • To report any incident to UAB Data Security that involves violations of UAB IT-related policies or involving UAB data or computer systems -https://silo.dso.uab.edu/incident/
  • The process for secure media destruction at UAB can be found here.

 

Desktop Local Administrator Rights Access Requests

i>Clicker Classroom Response System

  • Request an i>Clicker Instructor Kit (receiver and USB cable, flash drive and instructor remote) here.
 
Software
 
Published in Solutions

UAB has contracted with DriveSavers to provide data recovery services for the UAB
community. DriveSavers is the only data recovery company in the industry that undergoes
annual SAS 70 Type II Audit Reports and is HIPAA compliant, offering the highest level of data
security available. DriveSavers is also compliant with FAR 52.224-2 (Privacy Act), ISO 17799,
Sarbanes-Oxley Act of 2002 (SOX), the US government Data-At-Rest (DAR) mandate, the
Gramm-Leach-Bliley Act (GLBA) and the new regulation by National Institute of Standards and
Technology, NIST SP 800.34 (Rev. 1).


To view DriveSavers certifications, and learn more about Data Recovery Industry standards,
visit: http://www.drivesaversdatarecovery.com/proof


Order Data Recovery Services click & follow instructions.

Data Custodians must:

  • Abide by the Data Access Policy and the Data Protection Rule.
  • Be granted approval by the Data Steward before accepting, processing, storing, and/or transmitting data, especially when data is classified as Sensitive or Restricted/PHI by the UAB Classification Rule.
  • Follow all data handling and security requirements set forth by UAB policy and standards, along with any mandates set by specific data stewards charged with protecting UAB data.
  • Designate appropriate individuals with system administration responsibilities, ensuring that their role in securing the system is defined in their job description, and that they are trained in administration and security of the system.
  • Ensure adherence to UAB guidelines and procedures for protecting data as found in IT Security Practices.
  • Ensure compliance with all stipulations of this and other UAB policies and other legal and regulatory requirements including those related to dissemination of data (UAB's Information Disclosure and Confidentiality Policy) and disposal of computer equipment and systems (UAB's Equipment Accounting standards, and "Guidelines for secure disposal of media containing sensitive information").
  • Ensure that risk assessments are performed (including disaster recovery plans, backup and contingency plans) as required by HIPAA for all PHI. Risk assessment is recommended for all other sensitive or mission critical data.
  • Ensure that documentation of data resources created, used, or stored within their area of control is maintained.
  • Ensure that systems containing sensitive information are physically secured from unauthorized access.
  • Ensure that the department/unit follows procedures to mitigate all identified compromises or identified data security threats.
  • Ensure that actual or suspected data security breaches, especially when involving sensitive data, are reported to the Data Security Office immediately and that any recommended corrective action is implemented.
  • Ensure that non-UAB entities or contracted third party vendors handle data in accordance with UAB policies and procedures.
Page 2 of 2