Run Spinrite to analyze your hard disk in order to identify and attempt to correct any disk errors prior to encryption.
*While Windows XP is shown in the following video, the steps can be used for both Windows XP or Windows Vista platforms.
While it is impossible to anticipate every possible violation, examples are provided below to assist in defining what is considered to be responsible and ethical behavior. This list is not intended to be exhaustive; in general, any activity which does not directly contribute to UAB's mission may be considered inappropriate use.
- Commercial activities, advertising, or any other "for-profit" ventures not specifically approved by the UAB administration.
- Sustained promotion of any non-UAB activity or venture, profit or non-profit, public or private, personal or commercial, without approval of the UAB administration.
- Creating, displaying, or transmitting threatening, racist, sexist, or harassing language and/or materials.
- Creating, displaying, transmitting, or obtaining obscene or pornographic materials or any form of content which violates state and/or federal statutes and/or local standards of decency.
- Copyright and licensing violations including, but not limited to, providing or obtaining illegal copies of software or digital media (movies, videos, music, etc.) for which legal permission to distribute or possess has not been granted.
- Vandalism or mischief intended to incapacitate, compromise, or destroy UAB or other facilities, resources, or services.
- Forgery or attempted forgery of electronic mail or posts to electronic forums or any other act of deceptive labeling of the originator of an electronic communication.
- Obtaining goods, services, or funds of any form via electronic means by using the name and/or credentials of another person or entity without their consent and knowledge.
- Deliberately sending un-welcomed or off-topic messages to an individual or discussion forum. This includes continuing to send such messages after being asked by the individual or forum's owner/moderator to stop doing so even though the originator does not consider the material offensive or inappropriate.
- Transmitting unreasonable quantities of data or messages to persons or groups without their consent or request.
- Spamming or transmitting unsolicited material to a large number of individual persons and/or discussion lists, newsgroups, or other forums even though the material itself may not otherwise violate these guidelines.
- Being a continued impediment to other users through mass consumption of computing or network resources after receipt of a request to cease such activity, even if the activity is not otherwise disallowed.
- Transmitting without permission private information such as grades, medical records, financial data, or any other information that is protected by the Public Records Law or by legislation such as HIPAA, FERPA, etc.
- Attempts to compromise computer and/or network security measures or providing information/instructions for how to do so.
- Unauthorized, deliberate action which damages or disrupts a computing system or network, alters its normal performance, or causes it to malfunction. This includes intentional attempts to "crash" network systems or programs.
- Attempts to gain unauthorized access to other systems on the UAB campus or the Internet.
- Sharing of secure access credentials, such as passwords or private keys.
- Attempts to guess, capture, "hack" or decrypt the secure access credentials of other users.
- Attempts to possess, decrypt, or distribute data to which access has not been authorized.
- Attempts to elevate system privileges or access without consent.
- Unauthorized access of internal or external services through the use of stolen, guessed, hacked, copied, or discovered secure access credentials or other private data obtained without consent.
- The willful or negligent introduction of computer "viruses" or other disruptive/destructive programs into the UAB network or into external networks.
Cardholder privacy is important to the University of Alabama at Birmingham (UAB). To better protect the privacy of cardholder data, UAB provides this privacy statement explaining the security and handling practices of cardholder data in the processing of payment card transactions. This privacy statement shall be made available at any point where personally identifiable cardholder data may be requested by a UAB PCI Entity (merchant).
This privacy statement applies to all cardholder data collected by or submitted to a UAB PCI Entity, or on a UAB-maintained website. UAB PCI Entities and UAB websites will only collect personally identifiable information and cardholder data voluntarily provided by cardholders and customers, and will only use that information for the specific purposes for which it was provided. UAB will keep this information strictly confidential, and will not disclose, sell, or lease the information to third parties unless required by law, or with the written permission of the cardholder.
UAB-maintained websites may have links to other third party sites used for payment card transactions. These third party sites may collect cardholder data and personally identifiable information through the use of forms or cookies, or from the customer's web browser. Cardholders and customers are strongly encouraged to review the privacy policies of all third party websites outside the control of UAB for their procedures for collecting, utilizing, and disclosing cardholder data.
UAB has made significant investment in security measures employed to protect cardholder data under its control. Access to acquired cardholder data and personally identifiable information is limited to only those personnel for whom there is an established business need to access that data.
For questions, comments, or concerns regarding this privacy statement, or UAB procedures for securely processing, storing, or transmitting cardholder data, please contact the AskIT Help Desk at (205) 996-5555. UAB reserves the right to amend this privacy statement at any time, and will post this privacy statement and any updates at http://main.uab.edu/Sites/it/policies/payment-card-privacy/.
UAB & National Cybersecurity Awareness Month 2012
What is Outlook Web App Light?
Outlook Web App (OWA) Light is designed to aid those with low vision & to support web browsers that are not compatible with the Premium version. There are fewer features in OWA Light. These web browsers are listed by Microsoft as compatible with Outlook Web App Premium:
Windows XP & Later
- Internet Explorer 7 & later
- Firefox 3.0.1 & later
- Chrome 126.96.36.199 & later
Mac OS X 10.5 & Later
- Safari 3.1 & later
- Firefox 3.0.1 & later
- Firefox 3.0.1 & later
This is what OWA Light looks like:
The easiest way to sign in to OWA Light is to check the box to “use the light version of Outlook Web App” when signing in to https://mail.ad.uab.edu
If you find yourself using Outlook Web App Light, but wish to use Outlook Web Access Premium, there are 3 things to check:
- Are you using a compatible browser (as listed above)?
- Make sure the check box beside “Use the light version of Outlook Web App” is not checked when signing in.
- Uncheck “Use the blind and low vision experience by performing the following steps:
- While looking at your mailbox in OWA, click the “Options” button at the top.
- Click Accessibility on the left side
- Uncheck “Use the blind and low vision experience
- Click Save (just above the check mark)
- Click “Sign out” in the top right corner
- Sign back in to https://mail.ad.uab.edu
My Exchange mailbox has been deleted - Can I get it back?
We can retrieve your mailbox data if you make a request from the AskIT Help Desk within 21 days of the deletion. You can keep your e-mail address as long as you have it forwarded to an outside e-mail service like Gmail, Hotmail, or Yahoo. You can recreate your mailbox once you are an active student or employee at the university. If you have additional questions, please call 996-5555 or go to www.uab.edu/askit, where you can chat with an online agent.
Clients & Protocols
Outlook (MAPI, HTTPS), Outlook for MAC (EWS, POP3, IMAP), Mac Mail (EWS, IMAP, POP3), Outlook Web App (HTTPS), Windows Mail (POP3, IMAP), Mozilla Thunderbird (POP3, IMAP)
Hypertext Transfer Protocol (HTTP) is the protocol used to display Web pages but it can also be used to read e-mail with Outlook Web App (OWA). The advantage to OWA is that you can read, send, etc. e-mail from any computer with an Internet connection and a modern Web browser capable of supporting a secure connection (SSL). The Web address for OWA is https://mail.ad.uab.edu.
For any troubleshooting concerning OWA, send an e-mail to the firstname.lastname@example.org">AskIT Help Desk or call them at 205-996-5555. Microsoft also offers many tutorials and guides on their Web site.
Post Office Protocol (POP3) can be used by almost any client including Windows Mail and Mozilla Thunderbird. The difference between IMAP and POP3 is that POP typically pulls your e-mail messages off the server and stores them locally on your hard drive. This is fine unless a problem arises with your hard-drive, which may cause you to lose all messages stored on your machine. Your POP3 client will need to be capable of providing secure authentication.
Messaging Application Programming Interface (MAPI) is used by the full version Outlook client in conjunction with an Exchange mail server. MAPI is very much like IMAP but provides extended features within Outlook. This is only available in Outlook on a machine running Windows. You choose this protocol by selecting Microsoft Exchange Server within the Outlook e-mail account configuration.
The Exchange Web Services (EWS) protocol serves as the critical link in enabling secure synchronization between Microsoft Exchange Server 2010 systems and Snow Leopard-powered Macs.
Internet Message Access Protocol (IMAP) is the most common way to configure the Outlook for MAC mail clients. The benefit of using this protocol is that your e-mail messages remain on the server. When configured this way, you do not lose any e-mail messages should a problem arise with your personal computer and have the option of using Outlook Web Access when you so desire. Your IMAP client will need to be capable of providing secure authentication