IT Equipment Support

DotCIO provides hardware and software support.  Individuals in need of support should go to the DotCIO Get Help page for self-help knowledge base, how to request assistance and current help desk hours for phone or in-person support.   If it is determined that your equipment requires hardware repair or replacement, we will consult with you and provide recommendations for repair options or replacements as appropriate.

IT Equipment Lifecycle Planning Process

  1. Department/designee submits request for lifecycle planning.
  2. DotCIO reviews current state of departmental equipment.
  3. DotCIO and department designee review departmental needs.
  4. DotCIO provides recommendations.

IT Equipment Procurement Process

  1. Department/manager reviews employee needs.
  2. Department/manager obtains/allocates funding source.
  3. Department/manager submits request for new IT equipment.
  4. DotCIO staff reviews request and confirms appropriate (or makes other) recommendations.
  5. System is purchased or allocated internally.
  6. DotCIO staff completes initial configuration. 
  7. DotCIO staff coordinates with client for system setup, additional configuration and, if needed, migration of any data from previous system (if applicable).
  8. DotCIO staff will coordinate with departme

Obtaining IT Equipment

DotCIO provides services to assist departments with providing employees access to the right IT equipment to ensure they can be successful in their specific positions. 

Multimedia Services Announces Mediasite Capture Now Available to Faculty, Staff

Multimedia Services is pleased to announce that Mediasite Capture is now available to staff and faculty through MyMediasite.
 
Capture allows recording of video through a browser without installing any additional software. On a laptop/desktop, Capture will record the display, video, or both, with or without audio; on an iPad, it will record only audio/video, not the display.
 

ChatGPT and AI Tools & Data Classification

It is crucial that ChatGPT and other generative AI tools are used with caution and do not put Rensselaer data at risk.  Confidential and Internal Use data, as defined in the Information Classification policy, cannot be put into any of these tools unless a vetted contract is in place through procurement to ensure proper data security and privacy.

Additionally, all use cases should be consistent with the Cyber Citizenship Policy.

Securing Networked Printers

Connecting printers, copiers, and fax machines securely to Rensselaer's network is crucial to maintain the integrity, confidentiality, and availability of sensitive information. Implementing robust security measures helps mitigate potential risks associated with unauthorized access, data breaches, and network vulnerabilities.

Connecting to the Campus Network

Standards for network connectivity help to mitigate the various risks.  This best practice outlines minimum standards for devices connecting to the campus network (additional requirements may apply to specific devices which have been identified as having increased risk due to network location, sensitivity of data stored/sent/received, or access to other systems):

Staff/Faculty - Working Remotely; Use of Personal Devices

The stance of the Information Security Office within DotCIO is that access to Rensselaer data and systems for business operations should only be through Rensselaer owned and managed devices with appropriate security controls and configurations.   Please review the Information Classification Policy; by policy, personally-owned devices cannot not be used to store confidential data.  

Back to top