Skip to Knowledge Base content

Popular Articles

Tutorial on using your Cisco 7961 IP Phone
Steps to keeping your email secure
Project proposal template, with instructions on how to fill it out.
Canvas community is the online feature request site to submit your ideas to make Canvas better.
Procedures for requesting access to systems (Human Resources, Financial Services, and Student Admin)
Procedure for requesting timekeeper access in Workday
This Information Security Plan describes BYU-Hawaii's safeguards to protect covered data and information.
Helpful Hints
Cron Shell calls Java which does 3 things once daily at 12a on the SMTP.BYUH.EDU server
2. Downloads photos from MIS App Server and resizes each photo to 200 pixels
3. Writes all photos to .TAR BALL (=zip file)
Asynchronously at 8:30a daily INT025 runs an Inbound Studio process to pick up the zipped images from the TAR and loads the photos to the user profiles on Workday
Adding/Dropping users to bulletin distribution groups
File storage options for BYUH
This document summarizes the BYU Hawaii'’s (the “Institution’s”) comprehensive written information security program (the “Program”) mandated by the Federal Trade Commission’s Safeguards Rule and the Gramm – Leach – Bliley Act (“GLBA”).
Add a shared folder to your account
3 Easy steps to set up Dropbox
2016-2017 Risk assessment plan