Skip to Knowledge Base content

Recently Modified Articles

2016-2017 Risk assessment plan
This document summarizes the BYU Hawaii'’s (the “Institution’s”) comprehensive written information security program (the “Program”) mandated by the Federal Trade Commission’s Safeguards Rule and the Gramm – Leach – Bliley Act (“GLBA”).
This Information Security Plan describes BYU-Hawaii's safeguards to protect covered data and information.
Cron Shell calls Java which does 3 things once daily at 12a on the SMTP.BYUH.EDU server
2. Downloads photos from MIS App Server and resizes each photo to 200 pixels
3. Writes all photos to .TAR BALL (=zip file)
Asynchronously at 8:30a daily INT025 runs an Inbound Studio process to pick up the zipped images from the TAR and loads the photos to the user profiles on Workday
Helpful Hints
File storage options for BYUH
3 Easy steps to set up Dropbox
Add a shared folder to your account
Adding/Dropping users to bulletin distribution groups
Steps to keeping your email secure
Canvas community is the online feature request site to submit your ideas to make Canvas better.
Procedure for requesting timekeeper access in Workday
Procedures for requesting access in PeopleSoft.
Project proposal template, with instructions on how to fill it out.