Knowledge

All About Your New Computer

This information applies to FAS faculty and staff, as well as Central Administration staff, who have been provided with a new computer. Other users should contact their local IT department.

Along with your computer, you may have received a new or updated set of applications. As a result, HUIT has put together resources to help you become more familiar with some of the new features and tools, including materials pertaining to our standard suite of security applications, as well as some reference

Read more about All About Your New Computer

Using a Hardware Token for Two-Step Verification

To request a token, please contact your local IT Support Desk or email Hwtokenrequest@harvard.edu with the subject line "Request a hardware token," or call 617-495-7777. Each hardware token must be pre-configured by Harvard. You cannot use a token you have purchased yourself, it must be one provided by Harvard. Tokens take 15-30 days to be delivered.

A hardware token is a small device that, when plugged into your computer, offers two-factor verification with a touch of a button. Some important things to know about

Read more about Using a Hardware Token for Two-Step Verification

Enhanced Voice Mail Feature

Message Delivery

Now you can have your voice mail delivered directly to your Harvard email account.  There is no additional cost for this service and it is available to all Harvard voice mail users.  To enable this feature and learn more about the options you have regarding storage of voice mail messages please contact UC Customer Support by email at huit-telecom@harvard.edu or call 5-4900.

Read more about Enhanced Voice Mail Feature

Checklist for Non-consensual Access to Electronic Information

Under Harvard's Policy on Access to Electronic Information, access to user electronic information without the user's consent must be authorized by an appropriate person, and the scope of access must be minimized to user electronic information that is related to the University’s purpose in obtaining access.

Harvard IT professionals who are asked to access

Read more about Checklist for Non-consensual Access to Electronic Information

IT Professional Code of Conduct to Protect Electronic Information

In the course of supporting the business of the University, IT staff performing regular duties may have access to data in applications, emails and file systems or on desktops, servers and networks and other systems that must be protected by the University. In performing their duties IT staff will comply with applicable University policies including the Harvard Information Security Policy and 

Read more about IT Professional Code of Conduct to Protect Electronic Information

How to Request an AT&T Transfer of Billing Responsibility from Corporate to Personal

It is easy to transfer the billing liability for AT&T cellular service from Harvard corporate to personal billing. 

The following steps will assist one in transferring the billing responsibility:

  1. All persons must obtain written approval from an authorized point-of-contact in the respective Harvard University department or school. The approval allows the Harvard University Department or School to relinquish the billing liability for corporate cellular telephone service to the personal wireless subscriber.

  2. The authorized person must send an
Read more about How to Request an AT&T Transfer of Billing Responsibility from Corporate to Personal

How to Request a Verizon Wireless Transfer of Billing Responsibility from Corporate to Personal

It is easy to transfer the billing liability for Verizon Wireless cellular service from Harvard corporate to personal billing. 

The following steps will assist one in transferring the billing responsibility:

  1. All persons must obtain written approval from an authorized point-of-contact in the respective Harvard University department or school. The approval allows the Harvard University Department or School to relinquish the billing liability for corporate cellular telephone service to the personal wireless subscriber.

  2. The authorized person must
Read more about How to Request a Verizon Wireless Transfer of Billing Responsibility from Corporate to Personal

Problem Management

HUIT has adopted the Problem Management process for Major Incidents. 

The attached document is the draft Problem Management Process documentation. We shall be rolling out training and issuing communications as the process evolves.

Please contact Steve Rivers of the ITSM team with any questions.

Read more about Problem Management

External sources of ITIL training

All ITIL education that ends in certification must be taught by an accredited learning organization or educator.

ITIL Foundation can be taken as a self-study course.

ITIL Intermediate certifications require classroom hours, but this requirement is flexible enough to encompass teaching delivered via the Web. This is not the same as self-study – a personal “attendance” whether real or virtual is still mandatory – but it does avoid the expense of travel or on-site classes. A very clear and direct explanation of what is possible is on ITIL

Read more about External sources of ITIL training

Pages