Skip to Knowledge Base content

Popular Articles

Tutorial on using your Cisco 7961 IP Phone
Project proposal template, with instructions on how to fill it out.
Steps to keeping your email secure
Canvas community is the online feature request site to submit your ideas to make Canvas better.
Procedures for requesting access to systems (Human Resources, Financial Services, and Student Admin)
This Information Security Plan describes BYU-Hawaii's safeguards to protect covered data and information.
Procedure for requesting timekeeper access in Workday
Helpful Hints
This document summarizes the BYU Hawaii'’s (the “Institution’s”) comprehensive written information security program (the “Program”) mandated by the Federal Trade Commission’s Safeguards Rule and the Gramm – Leach – Bliley Act (“GLBA”).
Cron Shell calls Java which does 3 things once daily at 12a on the SMTP.BYUH.EDU server
2. Downloads photos from MIS App Server and resizes each photo to 200 pixels
3. Writes all photos to .TAR BALL (=zip file)
Asynchronously at 8:30a daily INT025 runs an Inbound Studio process to pick up the zipped images from the TAR and loads the photos to the user profiles on Workday
File storage options for BYUH
Adding/Dropping users to bulletin distribution groups
2018 Risk assessment plan
3 Easy steps to set up Dropbox
Add a shared folder to your account