A technology upgrade in Heritage Hall classroom 442 is earning rave reviews from those who use the classroom.

All of the technology in the room was upgraded: the computer is an all-in-one touch-enabled Windows 10PC; the AV controls were updated to the new classroom standard, with a new control panel with intuitive icon-driven interface; new, brighter projector; and Blu-ray player controlled by the touch panel.

“The Crestron system that controls the room will eventually be monitored remotely to ensure more efficient maintenance and support,” said Walt Creel, manager of classroom technology.

Academic adviser Raven M. Dials said she appreciated that UAB IT sought feedback from instructors and others on campus before making changes in the classroom.

“I had a guest speaker this past Tuesday, but she used the system and it worked great and looks amazing,” said academic adviser Raven M. Dials. “I was happy to see the upgrade as I was having issues every week with the projector shutting off in the middle of my presentations as well as our guest speakers. Thank you for taking the time to have it set up and asking for feedback!”

Academic adviser Courtney White added, “The new system is great. The old one would shut off about 10 minutes into my class every week and take me about five minutes to get the projector working again. I had absolutely no issues today.”

Learn more about the classrooms UAB IT serves here, and get the status of classroom technology here.
April UAB IT Security Awareness

Identity theft is a real threat; it can happen to anyone, and it can be challenging for victims to deal with the fallout. 

The following tips can help you prevent identity theft.

  • Read your credit card, bank, and pay statements carefully each month. Look for unusual or unexpected transactions. Remember also to review recurring bill charges and other important personal account information.
  • Review your health insurance plan statements and claims. Look for unusual or unexpected transactions.
  • Shred it! Shred any documents with personal, financial, or medical information before you throw them away.
  • Take advantage of free annual credit reports. In the US, the three major credit reporting agencies provide a free credit report once a year upon request.
  • If a request for your personal info doesn’t feel right, do not feel obligated to respond! Legitimate companies won’t ask for personal information such as your social security number, password, or account number in a pop-up ad, e-mail, text, or unsolicited phone call.
  • Limit the personal information you share on social media. Also, check your privacy settings every time you update an application or operating system (or at least every few months).
  • Put a password on it. Protect your online accounts and mobile devices with strong, unique passwords or passphrases.
  • Limit use of public Wi-Fi. Be careful when using free Wi-Fi, which may not be secure. Consider waiting to access online banking information or other sensitive accounts until you are at home.
  • Secure your devices. Encrypt your hard drive, use a VPN, and ensure that your systems, apps, antivirus software, and plug-ins are up-to-date.
If you become a victim of identity theft:

  • File a report with the US Federal Trade Commission at IdentityTheft.gov.
  • Use the identity theft report to file a police report. Make sure you keep a copy of both reports in a safe place.
  • Flag your credit reports by contacting the fraud departments of any one of the three major credit bureaus: Equifax (800-525-6285), Experian (888-397-3742), or TransUnion (800-680-7289).

The Information Security Liaison (ISL) program will establish a designated point of contact for security within each University academic and business unit.

The goal of the ISL program is to help streamline security efforts at UAB and is an important step in creating a secure computing environment. The head of each University academic and business unit has been asked to designate employees as primary and secondary Information Security Liaisons for your unit who will serve as a security point of contact.

The scope of responsibilities of the ISLs in each academic and business unit includes, but is not limited to, the following:
  • Serving as the primary contact for a department with EISO for information security issues.
  • Managing departmental network access authorization, including assigning network addresses, such as TCP/IP addresses, managing the Domain Name System (DNS) requests and local network connectivity.
  • Reporting departmental devices that handle critical, sensitive or restricted information, such as Social Security numbers, credit card numbers or health records.
  • Assisting employees with conducting University business in a secure and compliant manner.
  • Reporting and/or assisting with computer security incident response.
  • Participating annually in training specifically designed for ISLs.

If you contract your IT services, you will nominate someone from your contract services group.

Specific security roles and/or expertise are not required for this designation. Your designees will support UAB security initiatives and security needs for your unit. The employees that you designate as primary and secondary ISLs for your unit will act as a point of contact for the Information Security group.

Your employees serve as your unit’s ISL as long as you designate. We do ask that you please inform Information Security of any changes with your ISL designations as soon as they occur.
March 2017
A monthly report to UAB leadership and the IT community about technology projects
designed to enhance the work and lives of UAB staff, faculty and students.

New IT front door

UAB IT launches new, more user-friendly web site

UAB IT has launched a new, more user-friendly web site. The new site, built on the new wider template used by the UAB homepage, incorporates new buttons that offer direct access to the IT Service Portal, including ordering services, finding answers in the knowledge base and getting help from AskIT. Below the slideshow for UAB news are tiles that offer access to the most requested items on the IT web site, including software, email and checking ticket status in the IT Service Portal. The new site also offers an opportunity to better showcase IT initiatives and the work UAB IT does to help empower campus. Tour the new site here.

UAB Data Classification Rule
The Data Classification Rule establishes better protections for UAB student and staff information.
Updated policy better protects student, staff, university information
An updated Data Protection and Security Policy will help better protect university data and student and staff information. The updated policy, expected to go into effect this month, is supported by the Data Classification Rule, which establishes three levels of classification for data, and the Data Protection Rule, which establishes roles and responsibilities for protecting data.  Learn more about the Data Protection Rule here.

UAB IT implementing tools to keep credit card information safe
Sending sensitive data via email is dangerous — and UAB IT is implementing new methods to help prevent students, faculty and staff from sending information they might regret. Beginning March 3, UAB IT will implement a new system to help prevent credit card information from being transmitted via email. In the first phase, UAB IT's information security team will be notified of attempts to send a credit card number from a UAB email account. Learn more here.

IT Town Hall to focus on campus needs for AskIT help desk
UAB IT will host an open town hall meeting from 10 to 11 a.m. Monday, March 22, in the Alumni Theater at the Hill Student Center. The focus of the town hall will be campus needs and opportunities for improvement for the AskIT help desk. 

SPARK idea leads to new UAB app tile for writing center
The UAB app now has a tile on the student profile linking directly to the UAB Writing Center. An idea posted to the SPARK crowdsourcing campaign about the app led to the creation of the new tile. What app tools or tiles would make your life easier on campus? Submit your idea to the SPARK campaign, and vote and comment on other ideas.

UAB IT to host two email focus groups for campus
The UAB community is invited to participate in two email focus groups to better understand the email experiences of students, faculty and staff. These focus groups follow a campus-wide email survey last month. Email focus groups will be held from 10 to 11 a.m. Wednesday, March 1, at the Finley Conference Room, and from 1:30 to 2:30 p.m. Wednesday, March 8, at the Finley Conference Room.
SPARK campaign seeks ideas for Research Cores
The UAB Faculty Senate Research Committee is seeking input from UAB faculty and Core users on the best way to achieve its goals. The committee partnered with UAB IT to create a SPARK campaign seeking ideas on research cores. Log in to SPARK here to view the campaign, submit ideas and vote and comment on existing ideas.

TechConnect offers convenient location, educational pricing
Now that the spring semester is under way, are you looking for some new technology to boost your success? TechConnect, UAB IT’s technology store at the Hill Student Center, offers a convenient on-campus location and educational pricing on a variety of laptops, tablets, and accessories from top vendors. Looking to purchase a new MacBook Pro? Order directly from Apple on TechConnect’s web site or at apple.com/edu/uab. You will receive educational pricing along with fast, free shipping.
UAB IT helps build, maintain app for GEAR UP Alabama
UAB IT Application Consulting Services recently helped to build and maintain an application for GEAR UP Alabama to help support their ability to maintain documentation electronically via a dashboard portal from the many field personnel that support the mission of GEAR UP Alabama. “We are thrilled to have participated in helping bring these paper based and related tasks including submission processes into a centralized portal accessible by all devices, making it simpler and quicker for the field personnel to submit many documents that are used to maintain the mission of GEAR UP Alabama,” said Bill Laughlin, director of UAB IT Application Consulting Services. “The primary functional team are all employees of UAB working for the School of Education University department GEAR UP Alabama. We have been delighted to work with the staff, a very professional and devoted team serving an amazing cause for education.” GEAR UP Alabama spans 17 counties and serves more than 9,500 students in 21 school districts across Alabama’s Black Belt region. To learn more about GEAR UP ALABAMA visit their web site at gearupal.com. Gaining Early Awareness and Readiness for Undergraduate Programs (GEAR UP) is a competitive grant program of the U.S. Department of Education that increases the number of low-income students who are prepared to enter and succeed in postsecondary education. 

UAB IT looks to streamline PhishMe Reporter communication
Since implementing PhishMe Reporter last fall, students, faculty and staff have been reporting potential phishing emails to AskIT, helping UAB IT’s Information Security team to assess incoming emails that threaten to steal information from members of the campus community. PhishMe Reporter is an Outlook extension that allows you, with one click, to report suspected phishing emails. UAB IT is looking at ways to streamline communication associated with AskIT tickets generated by PhishMe Reporter — giving you more information in fewer emails. As AskIT and the Information Security team work on a solution, UAB IT will provide details to the campus community. 

Security tip: Stay cyber safe when you are on the road
We all like to travel with our mobile devices (smartphones, laptops, or tablets) — whether it’s to the coffee shop around the corner or to a café in Paris. These devices make it easy for us to stay connected while on the go, but they can also store a lot of information — including contacts, photos, videos, location, and other personal and financial data — about ourselves and our friends and family. Learn how to protect yourself and others.

Information security roadmap designed to protect campus
UAB IT presented plans for the information security roadmap to the President’s Risk Council on Feb. 21. The roadmap, which has a number of initiatives including data loss prevention, restricted data reduction, renovation of the UAB security policy system, multi-factor authentication and advanced email anti-phishing, is designed to protect the University from increasing cyber threats. UAB IT’s first imperative is secure computing, and greater resources for information security can help the university better protect its data and improve the maturity of the security program.

Grant to help address cybersecurity challenges
The National Science Foundation has awarded UAB a $2.1 million Scholarship for Service grant to help prepare a highly qualified workforce to address cybersecurity challenges and threats against the nation’s computer and information systems. Puri Bangalore, interim director of research computing for UAB IT, is a co-principal investigator for the grant. Learn more here

UAB IT helps with program to build Birmingham IT workforce 

A new grant to help prepare the Birmingham area workforce for new IT jobs got a helping hand last month from UAB IT. Staff members from the department’s Desktop Services helped install computers at Innovation Depot to prepare for the first cohort of future IT professionals to participate in training as part of the Innovate Birmingham program. Learn more here.

UAB IT represented at CIO events across country
UAB IT's efforts to become a world-class information technology organization have showcased at several conferences and roundtables over the past month. Vice President and CIO Dr. Curtis A. Carver Jr. represented UAB at the CIO Atlanta Summit on Feb. 9, presenting on the topic "The Transformational CIO." Carver also participated in a Harvard Business Project roundtable to preview a new report on revenue-generating CIOs and contribute to the final draft; served as a panelist at a CDW-sponsored event focused on how better to serve the higher education market with best-in-class service and experience; and participated in a digital transformation panel at the Gartner CIO Leadership Forum. "These events are an opportunity to demonstrate how UAB IT is transforming to become a world-class IT organization that supports a world-class university," Carver said.

UAB Benevolent Fund adds TechBridge 
TechBridge is one of 10 new reasons to support the UAB Benvolent Fund this year. The organization brings affordable technology and business expertise to other nonprofits by connecting organizations with needs to the skills and financial resources of people in the technology community. TechBridge focuses on nonprofits combatting the causes of poverty — lack of access to shelter, food, employment, education, health care and financial literacy — to expand its impact. Learn more here.

Good Games UAB hosts BlazerCon 
Good Games UAB — usually styled gg.UAB — is hosting its biggest event of the year, the annual BlazerCon, on the third floor of the Hill Student Center March 31-April 1. The event will include video and card game tournaments, arcade cabinets, movie screenings and more. Learn more here

Next employee email migration to cloud includes Human Resources

UAB IT is continuing with pilot programs to move University faculty and staff to email in the cloud using Office 365. The migration of employees in Human Resources will begin this month, followed later in March by other departments served by UAB IT's Desktop Services. Email for employees in UAB IT and the School of Engineering has already been moved to the cloud. Once pilot programs are complete, UAB IT will schedule a town hall meeting to answer questions about the process and begin scheduling migrations for the rest of campus. UAB IT appreciates the participation of each pilot group as IT staff learn better how to migrate all faculty and staff. Learn more about the project here.

UAB IT to solicit feedback to develop customer profiles
To improve engagement with the rest of the UAB community, UAB IT is developing best practice-based guidelines for co-authoring and collaboration, including profiles of major customer groups. To build these profiles, a brief survey will be issued in March to identify each group’s technology and communication preferences. Prior to that, UAB IT will be meeting with various governing bodies to discuss plans and solicit feedback on optimizing survey participation. The survey will begin March 20 and end April 7. Profiles include students, faculty, staff and UAB IT professionals. UAB IT will then be able to create more relevant service portfolios and increase overall customer satisfaction.  

First IT Strategic Advisory Committee meeting set for this month
The first meeting for the inaugural IT Strategic Advisory Committee will be held March 6 from 10:30 a.m. to noon. This committee fulfills the UAB strategic plan’s imperative to establish shared governance. The committee is made up of 20 individuals from across the campus including faculty, students and staff, as well as a representative from the hospital. The committee will provide advice and guidance on how the university should prioritize, plan and allocate resources to meet the technology needs of the university. After this initial meeting, open sessions will be held.

VoIP PLANNING ONGOING: UAB IT is continuing plans to upgrade infrastructure to change campus telephones to voice-over-internet protocol. VoIP systems allow greater flexibility, save money and are more cost-effective.

UAB IT offers unlimited storage through UAB Box and OneDrive. Learn more about Box here and learn more about OneDrive here.

IT CONTRACT REVIEW TIPS: UAB IT is responsible for reviewing any University contract that includes an IT or IT-related component prior to such contract being executed. UAB IT offers tips to help facilitate the speedy processing of contracts once they are routed to IT for review.
February 10, 2017

Security tips

  • Use a unique password for each site. Hackers often use previously coampromised information to access other sites. Choosing unique passwords keeps that risk to a minimum.
  • Use a password manager. Using an encrypted password manager to store your passwords makes it easy to access and use a unique password for each site.
  • Know what you are sharing. Check the privacy settings on all of your social media accounts; some even include a wizard to walk you through the settings. Always be cautious about what you post publicly.
  • Guard your date of birth and telephone number. These are key pieces of information used for verification, and you should not share them publicly. If an online service or site asks you to share this critical information, consider whether it is important enough to warrant it.
  • Keep your work and personal presences separate. Your employer has the right to access your e-mail account, so you should use an outside service for private e-mails. This also helps you ensure uninterrupted access to your private e-mail and other services if you switch employers.
  • There are no true secrets online. Use the postcard or billboard test: Would you be comfortable with everyone reading a message or post? If not, don't share it.
  • Read your credit card, bank, and pay statements carefully each month. Look for unusual or unexpected transactions. Remember also to review recurring bill charges and other important personal account information.
  • Review your health insurance plan statements and claims. Look for unusual or unexpected transactions.
  • Shred it! Shred any documents with personal, financial, or medical information before you throw them away.
  • Take advantage of free annual credit reports. In the US, the three major credit reporting agencies provide a free credit report once a year upon request.
  • If a request for your personal info doesn’t feel right, do not feel obligated to respond! Legitimate companies won’t ask for personal information such as your social security number, password, or account number in a pop-up ad, e-mail, text, or unsolicited phone call.
  • Limit the personal information you share on social media. Also, check your privacy settings every time you update an application or operating system (or at least every few months).
  • Put a password on it. Protect your online accounts and mobile devices with strong, unique passwords or passphrases.
  • Limit use of public Wi-Fi. Be careful when using free Wi-Fi, which may not be secure. Consider waiting to access online banking information or other sensitive accounts until you are at home.
  • Secure your devices. Encrypt your hard drive, use a VPN, and ensure that your systems, apps, antivirus software, and plug-ins are up-to-date.
  • Secure your devices with a strong password, pattern, or biometric authentication. Check the settings for each device to enable a screen-lock option. For home routers, reset the default password with a strong one.
  • Install anti-malware. Some software includes features that let you do automatic backups and track your device.
  • Check your Bluetooth and GPS access. Disable these settings on all devices when not needed and avoid using them in public areas.
  • Update your devices often. Install operating system and application updates when they become available.
  • Review phone apps regularly. Remove any apps you don’t use. Be selective when buying or installing new apps. Install only those from trusted sources and avoid any that ask for unnecessary access to your personal information.
  • Treat devices like cash! Don’t let your devices out of your sight or grasp. Maintain physical control of your device in public areas. Get a lock (alarmed is best) for your laptop and use it.
  • Keep it sunny in the cloud. Whether using Google Drive, Dropbox, OneDrive, iCloud, Amazon Drive, or any of the many cloud options, set privacy restrictions on your files to share them only with those you intend. Protect access to your cloud drive with two-factor authentication.
  • Create a secure wireless network. Configure your wireless router to protect your bandwidth, identifiable information, and personal computer. Secure it with proper set up and placement, router configuration, and a unique password, using the strongest encryption option. See http://www.wi-fi.org/ for more tips.
  • Protect your Internet of Things (IoT) devices. Are you sharing your livestreaming nanny cam with the world? Review privacy settings for all Internet-ready devices before connecting them to the web.
  • Always: Use a unique password for each account so one compromised password does not put all of your accounts at risk of takeover.
  • Good: A good password is 10 or more characters in length, with a combination of uppercase and lowercase letters, plus numbers and/or symbols — such as pAMPh$3let. Complex passwords can be challenging to remember for even one site, let alone using multiple passwords for multiple sites; strong passwords are also difficult to type on a smartphone keyboard (for an easy password management option, see “best” below).
  • Better: A passphrase uses a combination of words to achieve a length of 20 or more characters. That additional length makes its exponentially harder for hackers to crack, yet a passphrase is easier for you to remember and more natural to type. To create a passphrase, generate four or more random words from a dictionary, mix in uppercase letters, and add a number or symbol to make it even stronger — such as rubbishconsiderGREENSwim$3. You’ll still find it challenging to remember multiple passphrases, though, so read on.
  • Best: The strongest passwords are created by password managers — software that generates and keeps track of complex and unique passwords for all of your accounts. All you need to remember is one complex password or passphrase to access your password manager. With a password manager, you can look up passwords when you need them, copy and paste from the vault, or use functionality within the software to log you in automatically. Best practice is to add two-step verification to your password manager account. Keep reading!
  • Step it up! When you use two-step verification (a.k.a., two-factor authentication or login approval), a stolen password doesn’t result in a stolen account. Anytime your account is logged into from a new device, you receive an authorization check on your smartphone or other registered device. Without that second piece, a password thief can’t get into your account. It’s the single best way to protect your account from cybercriminals.
  • If possible, do not take your work or personal devices with you on international trips. If you do, remove or encrypt any confidential data.
  • For international travel, consider using temporary devices, such as an inexpensive laptop and a prepaid cell phone purchased specifically for travel. (For business travel, your employer may have specific policies about device use and traveling abroad.)
  • Install a device finder or manager on your mobile device in case it is lost or stolen. Make sure
    it has remote wipe capabilities and that you know how to do a remote wipe.
  • Ensure that any device with an operating system and software is fully patched and up-to-date with security software.
  • Makes copies of your travel documents and any credit cards you’re taking with you. Leave the copies with a trusted friend, in case the items are lost or stolen.
  • Keep prying eyes out! Use strong passwords, passcodes, or smart-phone touch ID to lock and protect your devices.
  • Avoid posting social media announcements about your travel plans; such announcements make you an easy target for thieves. Wait until you’re home to post your photos or share details about your trip.
  • Fortify each online account or device. Enable the strongest authentication tools available. This might include biometrics, security keys, or unique one-time codes sent to your mobile device. Usernames and passwords are not enough to protect key accounts such as e-mail, banking, and social media.
  • Keep a clean machine. Make sure all software on Internet-connected devices — including PCs, laptops, smartphones, and tablets — are updated regularly to reduce the risk of malware infection.
  • Personal information is like money. Value it. Protect it. Information about you, such as purchase history or location, has value — just like money. Be thoughtful about who receives that information and how it’s collected by apps or websites.
  • When in doubt, throw it out. Cybercriminals often use links to try to steal your personal information. Even if you know the source, if something looks suspicious, delete it.
  • Share with care. Think before posting about yourself and others online. Consider what a post reveals, who might see it, and how it could be perceived now and in the future.
  • Own your online presence. Set the privacy and security settings on websites to your comfort level for information sharing. It’s okay to limit how and with whom you share information.
  • Identity thieves. Cybercriminals need only a few pieces of information to gain access to your financial resources. Phone numbers, addresses, names, and other personal information can be harvested easily from social networking sites and used for identity theft. Cybercrime attacks have moved to social media, because that’s where cybercriminals get their greatest return on investment.
  • Online predators. Are your friends interested in seeing your class schedule online? Well, sex offenders or other criminals could be as well. Knowing your schedule and your whereabouts can make it very easy for someone to victimize you, whether it’s breaking in while you’re gone or attacking you while you’re out.
  • Employers. Most employers investigate applicants and current employees through social networking sites and/or search engines. What you post online could put you in a negative light to prospective or current employers, especially if your profile picture features you doing something questionable or “less than clever.” Think before you post a compromising picture or inflammatory status. (And stay out of online political and religious discussions!)
February 07, 2017


UAB students, employees and faculty members should use this secure network. Users must have a valid BlazerID and password, and have their WiFi device properly configured for this network. Instructions for configuring a WiFi device for UABSecure are listed below.

Manual setup instructions for UABSecure

OSX 10.9

Windows 7

Windows 8

Windows 10


University of Alabama at Birmingham



Related Policies, Procedures, and Resources

Data Classification Rule

1.0 Introduction

UAB electronic information assets (data) must be protected and maintained in accordance with all applicable federal and state laws and university policies. The intent of this policy is to provide a framework to ensure that electronic data, in all forms, are adequately protected.  This policy specifically outlines:

  • The roles and responsibilities of the UAB community for data protection and security;
  • Additional requirements associated with the use and maintenance of systems containing sensitive information.

2.0 Scope and Applicability of Policy

Managing and protecting data are responsibilities shared by all members of the UAB community [i.e., all individuals (faculty/staff/students/visitors), schools, departments, affiliates, and/or other similar entities within the UAB, including employees of contracted or outsourced non-UAB entities].  This policy applies to all UAB data and systems including, but not limited to, centralized institutional systems, departmental/unit systems, systems created or operated by third party vendors under the direction of UAB, and UAB data in any system.

3.0 Policy Statement

All members of the UAB community should protect their data and data under their control and periodically review all applicable data security, confidentiality, and acceptable use policies. The following rules and policies apply to data classification and protection:

  • Institutional Data must be classified according the UAB Data Classification Rule.
  • University Data must be protected according to the UAB Data Protection Rule.
  • Health System data must be protected according to the UAB HIPAA Policies.

Any information system that stores, processes or transmits institutional data must be secured in a manner that is considered reasonable, appropriate and compliant with University Policies and Federal and State Laws.  The required level of security depends on the nature of the data, as defined in the UAB Data Classification Rule.

3.1 Risk Assessment

Deans and administrative unit heads (in conjunction with UAB Information Technology) are responsible for ensuring the assessment and periodic review of the business processes and technical risks associated with implementing any planned, proposed, or existing electronic information system or data collection system. Risk assessments must identify specific procedures to minimize risks and the impact of potential breach/compromise of data.

3.2 Other Data Security Policies at UAB

Other data security policies implemented at UAB (campus-wide or locally by/for a specific department, school, or system) may be more restrictive than this UAB-wide policy but may not be less restrictive. Each University department/unit is responsible for implementing, reviewing and monitoring internal policies, practices, etc. to assure compliance with this policy.

3.3 Incident Reporting and Management

Any suspected breach or compromise of Sensitive or Restricted Data must be reported immediately to the Information Security Office in the Office of the Vice President for Information Technology and to the dean or administrative unit head.  Specific procedures for reporting a suspected or actual breach/compromise of data are located on the Information Security web site.  Upon receiving the report, the Information Security Office will be responsible for conducting or coordinating the investigation, making or assessing recommendations for corrective action, reporting the incident to the Executive Computer Incident Response Team (ECIRT) and other administrative units as needed, and maintaining documentation of the incident.

4.0 Exception

Exceptions may be granted in cases where security risks are mitigated by alternative methods, or in cases where security risks are at a low, acceptable level and compliance with minimum security requirements would interfere with legitimate academic or business needs. To request a security exception, complete the Information Security Exception Request Form.

5.0 Non-Compliance

Confirmed violations of this policy will result in consequences commensurate with the offense.  Intentional release of Restricted Data or egregious violations of this policy may result in termination of employment, appointment, student status or other relationships with UAB.

6.0 Maintenance

This policy will be reviewed by the UAB’s Information Security Office periodically or as deemed appropriate.

7.0 Implementation

The Vice President for Information Technology is responsible for the oversight and implementation of this policy, including the overall procedures related to its implementation and management.


UAB IT Research Computing will hold its spring HPC User Forum on Wednesday, Feb. 8.

The event will be held from 1 to 2:30 p.m. in Ballroom C at the Hill Student Center.

UAB IT Research Computing aims to conduct two user forums through the year (spring and fall) to update the HPC user community on the status of the HPC system, the organization, planned upgrades, policy changes, and to receive feedback from users in order to improve delivery of HPC services and support to the community.

With UAB's last HPC upgrade in fall 2016, UAB IT now has more than 2,300 additional compute cores and 6 petabytes of storage available to help researchers analyze and manage data and UAB aims to grow the compute, storage and network fabrics to support research needs on Campus.

Please register to attend the HPC user forum here.
January 17, 2017

Error: Box

Sign In Error for Box 2

Please open a service ticket with AskIT to assist you with this request.
October 2016
A monthly report to UAB leadership and the IT community about technology projects
designed to enhance the work and lives of UAB staff, faculty and students.

Our shared responsibility

Month of activities set to boost security awareness on campus

Cyber security is our shared responsibility — particularly at UAB, as we work to protect our personal information and university data. October is National Cyber Security Awareness Month, and UAB IT has a number of activities planned to boost awareness of what students, faculty and staff can do to protect themselves and our institution. Read more about Cyber Security Awareness Month activities.

Free Laptop Checkup open for students Oct. 4-5
UAB IT wants to help protect students’ computers — for free. The first Laptop Checkup for undergraduate students will be held from 10 a.m. to 3 p.m. Oct. 4-5 at the Hill Student Center. Check-in will be in the front of the TechConnect store on the first floor, and the laptop security checks will take place in room 220. Learn more here.

Simulated phishing emails can help boost awareness
Phishing emails put UAB IT students, faculty and staff at risk, so UAB IT is launching a new program that simulates such attacks to help educate the campus community about how to recognize suspicious messages. Learn more here.

Get one-click access to report phishing emails
Reporting suspicious messages used to be a multi-step process for UAB users, but now you can report a suspicious message with a single-click. Learn more here.

Outlook Mobile app now available for UAB email accounts
UAB students, faculty and staff will now be able to use the Microsoft Outlook Mobile app for their UAB email accounts. UAB IT had previously blocked the Outlook Mobile app because of security risks, which Microsoft has now addressed. The native mail applications for iOS and Android can also still be used for UAB email accounts. “Protection of UAB student, faculty and staff data is our top priority,” said Brian Rivers, chief information security officer. "Now that Microsoft has addressed security concerns, we're glad to make the Outlook Mobile app available to campus users who prefer it for their mobile devices."

Keeper password manager can make your life easier
Keeper is a password management tool that helps you keep track of different password logins so all you have to remember is one master password. Learn more here.
UAB researchers use expanded computing power to accelerate big-data science
UAB researchers use expanded computing power to accelerate big-data science.
State's fastest supercomputer advances UAB research
With its new high-performance computing cluster, the fastest supercomputer in Alabama, the University of Alabama at Birmingham can now execute tasks in a couple of hours that took an entire day with the equipment it had in 2015. Learn more here

Event showcases research cyberinfrastructure
Researchers had the opportunity to showcase how they use the resources supported by UAB IT at Research Computing Day, held Sept. 14 at the Hill Student Center. The event also highlighted trends in research cyberinfrastructure, with industry leaders participating in the discussion. 

Research computing takes part in Core Day event
Research Computing personnel presented a poster at the UAB Core and Shared Resources Day 2016 on Sept. 9 at the Hill Student Center Ballroom. The event offers a unique opportunity for UAB's science and technology communities to come together in a central location to raise awareness about the many shared research facilities available on campus. 
TechConnect now offers repair services at Hill Center
TechConnect, UAB IT's technology storefront at the Hill Center, now offers a variety of technology repair services. The services, at competitive prices and in a convenient, on-campus location, are available for students, faculty and staff. Learn more here.
New cell phone plans eliminate overage charges
UAB IT is debuting new cell phone rate plans that are designed to be more economical and easier to understand. UAB has moved to the state cell phone rate plan. The new plans use shared minutes to eliminate overage charges and reduce overall costs, which will save the institution more than $70,000 over the next year. Users will be mapped to the appropriate plan based on a six-month average of their usage. New rate plans will on the November bills. Learn more here.
TechBridge partnership aids local non-profit organizations
UAB IT is a founding member of Birmingham's TechBridge chapter, which provides local nonprofits with business and technology assistance. Several regional corporations and institutions are partners in the organization. At an event late last month, the group announced its new partner nonprofits, for whom the group will use technology to transform their ability to serve the community. UAB IT, which was represented at the event, is committed to enhancing the community of information technology excellence for the economic, social and cultural benefit of Birmingham and beyond.

Carver to deliver keynote for first Alabama IT Symposium
Vice President and CIO Dr. Curt Carver will kick off the day with a keynote presentation for the inaugural Alabama IT Symposium, set for Nov. 10 at the Doubletree Hilton in Birmingham, is a one-day, executive level event designed to bring together IT management teams in Alabama. IT leaders will have the opportunity to network, collaborate and learn from their peers. Learn more about the event here.
Regional information security teams meet at UAB
The information security teams from UAB IT and HSIS hosted a regional security roundtable with their colleagues from universities across the Southeast on Sept. 30. 

UAB to host Cyber Security symposium
UAB’s Departments of Computer and Information Sciences and Justice Sciences, as well as the Center for Emerging Technology Investigations Forensics & Security will host Cyber Security 2020 on Oct. 13. The event will bring together business leaders, academics, policy makers, attorneys, chief information security officers, and others interested in information security. Industry leaders will serve as keynote speakers and will lead targeted breakout sessions alongside local and national experts to discuss best practices and tools for cyber security, policy and legal issues, incident response, contingency planning as well as cyber security insurance. In addition, researchers from around the state will provide insights on how universities are meeting our common cyber security challenges. Learn more here.
Security session will bring new info to campus IT
Campus IT professionals are invited to an information security session in which UAB IT will discuss upcoming plans for data classification, firewall requests and workflow, and incident response and crisis management. The session will be held from 2 to 3 p.m. Thursday, Oct. 13, in Cudworth Hall 140.

Software distribution changes delayed
Changes to the distribution method for software for UAB-owned machines has been delayed due to technical reasons. IT professionals across campus have worked with UAB IT to co-design the new solution for institutional software downloads. The new solution will use Microsoft System Center Configuration Manager (SCCM), which is installed on most UAB-owned computers. 
FASTER INTERNET: 100 Gbps connections are on the way for UAB. The upgraded connections will increase internet speed on campus up to 10 times, making UAB's network the fastest among universities in the state.

NEW APP: UAB IT has partnered with UAB Media Relations to develop a redesigned UAB app, which offers the most efficient way to get around and get connected on campus. The campus map has GPS-style directions to any location at UAB, and there is a full directory search.

IMPROVED CUSTOMER EXPERIENCE: With a renewed focus on improving the customer experience, UAB IT is in the final stages of hiring a new associate director for the AskIT help desk, with the hope of bringing the person on staff by November. Learn more about UAB IT's plans for improving the AskIT help desk.
AKAMAI PARTNERSHIP: UAB has improved internet performance across campus through a partnership with Akamai, a web caching service. Learn more here.