How To Find A Student's UserID

1.Open Outlook
2.Create a new email
3.In the “To” field enter the student’s name
4.Click the “Check Names” icon
5.The student’s name will be linked to their User ID automatically or it will prompt you to pick the correct name if there are similar names.
6.Right click the student’s name
7.Select outlook properties
8.The “Alias” field will contain the student’s User ID.

Finding Student UserIDs and Student Portal UserIDs For A Whole Class
1.Double click on the P.I.T. Reports icon on your desktop or use the following URL: http://pitsql/Reports/Pages/Report.aspx?ItemPath=%2fReports%2fPublic%2fStudent+UserIDs
2.Click the Directories link.
3.Click the Student UserIDs link.
4.Select the campus and program your class is in.
5.Click “View Report”
6.Click the print icon or select a format and export the report to your drive.

* If a name appears with no ID under Portal User ID the ID has not been created before.

I Still Can't Find The UserID For A Student
Please ensure the student has had a successfully recorded attendance. Student UserIDs are based on information in CampusVue and may not be generated if a student has never been recorded as attending a class. After recording their attendance, a UserID should be created later that evening automatically.

What Is the password for new students to log in?
The default password for new students is “Student!”

My students still can't log in!
After providing them with their User ID and password, some students may require additional coaching. Common mistakes include, forgetting the caps-lock key, selecting unacceptable passwords, entering the password only once, entering the new password in the field for the old password, selecting passwords that are easily forgotten or mistyped, and selecting the wrong network to log on to. By paying attention to these common issues, one can ensure smooth access.
How Do I Use Computers At PIT
In order to use P.I.T. computing resources you must logon using a User ID and Password. These will be provided to you by your instructor or supervisor. When first logging in, you will be asked to change the initial password, also provided by your instructor or supervisor. You must then enter your new password twice. Passwords must be at least 5 characters long. Passwords must contain 3 of the following character types: upper-case(ABC), lower-case(abc), numbers(123) and symbols(!@#). Passwords may not contain your name or be the same as your last password. If you incorrectly enter a password 3 times, the account will be locked for 30 minutes. The following directions will walk you through connecting to the LAN on a P.I.T. owned PC.

When logging in I am told, "PIT Domain not Available."

Your computer does not have a reliable connection to the network. If you have a desktop, ensure that the network cable is securely inserted and there are link lights active. If you have a laptop, bypass wireless access by using a network cable.
After ensuring the machine is correctly connected, reboot and try again.

I'm locked out or I forgot my password.

Please have someone enter a helpdesk request on your behalf, or contact the helpdesk telephone at extension 1575. Students who need their password reset can do so with designated faculty members who have been given this ability:

Abbas Abdulmalik
Donovan Anglin
Rachelle Chaykin
Robert Dixon
Thomas Epp
How do I set up Outlook 2003 to access my email while at P.I.T.?

1. Log onto a PC using your P.I.T. assigned User ID.
2. In the bottom left-hand side of the screen left click on the START button. When the menu appears on the top left of it, find the icon for Microsoft Outlook 2003. Left click on the icon.
3. An Outlook 2003 Startup menu will appear on the screen. Left click “Next” at this point.
4. At the next screen that asks “Would you like to configure an E-mail Account?” leave the radio button in the default top circle box saying “Yes”, then left click “Next”.
5. On the Server Type Screen choose the first option Microsoft Exchange Server and click on the radio button next to it, then click “Next”.
6. Type “PITMAIL” into the “Microsoft Exchange Server” area
7. Type in your User ID in the “User Name:” area.
8. Left click on “Check Name”
9. Left click on “Next”
10. Left click on “Finish”
11. Finally, your email shows up and asks you to, “Please enter your full name and initials below”. The default information is acceptable, left click “OK”.
12. This must be repeated for each PC you wish to access email on.

How do I set up Outlook 2007 to access my email while at P.I.T.?
1. Log onto a PC using your P.I.T. assigned User ID.
2. In the bottom left-hand side of the screen left click on the START button. When the menu appears on the top left of it, find the icon for Microsoft Outlook 2007. Left click on the icon.
3. An Outlook 2007 Startup menu will appear on the screen. Left click “Next” at this point.
4. At the next screen that asks “Would you like to configure an E-mail Account?” leave the radio button in the default top circle box saying “Yes”, then left click “Next”
5. Outlook 2007 will automatically find your name and display it. In the lower left corner of the window check the box labeled, “Manually configure server settings or additional server types” and click “Next”
6. Click the Radio button labeled, “Microsoft Exchange” and click “Next”
7. Type “PITMAIL” into the “Microsoft Exchange Server” area
8. Left click on “Next”
9. Left click on “Finish”
10. This must be repeated for each PC you wish to access email on.
11. If Outlook asks you about search features or RSS, select “No”
How do I access my PIT email from home?
P.I.T. allows students and faculty to access their email from outside our network through Webmail. Webmail can be reached at www.pit.edu. To access Webmail, select the “WebMail Login” button at the upper right corner of the P.I.T. web page. You will be presented with a login box. Note that you must enter your full email address. You should be able to access all emails, contacts, events and reminders you’ve entered in Outlook, as well as create new emails.

I just started at P.I.T. or have been away from the school for a while. I can not access Webmail at all!
Your password has expired or you are a new student/faculty member who’s never logged in to a P.I.T. computer previously. You must log in to a P.I.T. computer and select a new password first. Remember this password, as you will need it for webmail.

I changed my password and Webmail won't automatically log in anymore.
You’ve selected the “Remember my password” box, but changed your password in the school. Your browser is sending an old password it has saved. In Internet explorer select Tools->Internet Options->General tab->Delete Browsing History. Delete all saved passwords.

Webmail asks for a password every time I click anything.
You’re using Firefox or another non-Microsoft browser. Open an email. Cancel when asked for credentials. Return to your inbox. Remove "/exchange/" from the end of the URL. Press enter and cancel when asked for credentials. Add "exchange/" to the end of the URL and press enter. Enter your credentials.
How do I set up my telephone?
1. Dial 2500
2. Press *
3. Enter your mailbox/extension number.
4. Enter your password and press #. Your password is the same as your extension.
5. Create your own password up to 12 digits.
6. Enter your new password followed by the POUND sign
7. Voicemail will repeat the password back
8. Confirm password by pressing POUND
9. Voicemail prompt will ask you to say your name for the company directory followed by pound
10. SAY ONLY YOUR NAME (you will record your greeting later)
11. Listen to your name by pressing 1 ( you may erase and re-record by pressing 3)
12. Press POUND to confirm your name
13. At this time voicemail will introduce you to a few basic features of the phone system. You should not skip this. PLEASE DO NOT HANG UP!
14. After the introduction the prompt will tell you your VOICE MAIL IS FULLY SET UP. You must now record your personal greeting.
15. Press 4 for personal options
16. Press 1 to record a personal greeting
17. Press 1 again for the primary greeting or 2 for an alternate greeting
18. You will be prompted to record a greeting after the tone

Sample greeting: Hello, you’ve reached the desk of _________. Sorry I missed your call. I am either out of the office or away from my desk. Please leave a message after the tone and I will call you back as soon as possible. If you need immediate assistance please press 0 for the operator at any time. Thank you.

19. Press POUND to stop recording
20. Press 1 to listen or 3 to erase and re-record
21. Press POUND before hanging up to confirm recording
How do I fill out an Interactive PDF form?
An Interactive PDF form that users can fill out electronically. If you like to have an interactive PDF form for the Policy PIT application (http://policypit/), then please submit a helpdesk ticket.

Please note the following:

1.Send the requested form in the attachment field.
2.Please send the forms only (no policies or procedures).
3.The conversion process may take a couple of days, depending on the work load.
4.The form will be converted as it is presented in the attachment, word for word.
5. The form will be converted to PDF format.

P.I.T. Information Technology Purchasing Policy
January 21, 2009

Purpose:
The purpose of the policy is to coordinate purchasing activities for hardware, software and services related to any computing applications at P.I.T. The policy is intended to ensure:

1. The necessary computer hardware, data handling facilities and/or software that will be required for any computer related application will be available and working by the time it is needed.

2. Applications installed on College computers, networks or related facilities do not conflict with other College approved and supported applications
3.College resources are maximized by adopting software, hardware and applications that will have use in multiple departments with similar requirements.

The policy cannot anticipate factors beyond any person’s control that may delay the installation and testing of systems. However, cooperation in following this policy will certainly help us all complete those tasks that are in our control.

General Policy:
1. All requirements including detailed specifications for new hardware, software, applications and IT related services must be reviewed and approved by the Chief Information Officer (CIO) of the College. Included in the definition of requirements are requirements for support from the IT department. (It is recommended that a representative of the IT department be involved as early as possible in discussions of requirements and discussions with outside vendors who may supply the required items.)
2.All proposals from vendors for hardware, software or services must be reviewed and approved by the CIO before a request for purchase can be processed.
3.All purchase requests for hardware, software or IT services using funds under the control of the College must be approved by the CIO and the College President. Purchase requests that do not comply with items 1 and 2 above may not be approved.

Additional Policies for Academic Purchases:
All hardware and/or software that is new for a class (not currently installed), and is to be installed by the IT department, must be delivered to the IT department 10 working days prior to the start of the class in which it will be used.
To assure timely delivery of hardware and software, purchase orders must be executed 45 days prior to the start of the class in which it will be used. This requirement includes completing the necessary purchase orders, obtaining approvals for purchases and the placement of the order with the chosen supplier.
The detailed requirements and specifications for hardware and/or software required for a class must be available for review by the IT department 60 days prior to the start of a class. The IT department will be able to review the requirements and provide recommendations for the items to be purchased and suppliers to provide quotes for the purpose of purchasing requirements.

Computer Use Policy

Computer And Communications Tools Usage Policy
Pennsylvania Institute of Technology

Scope of This Policy
This Policy applies to the Pennsylvania Institute of Technology, and anyone using communications tools owned or otherwise utilized by this Institution (such as e-mail, the Internet or an intranet, voicemail, telephones, copiers or scanners and fax machines) and the usage of the tools at any time, whether in or out of the office, and during or after regular school/work hours. This policy applies to all of P.I.T. employees, students and all persons authorized by the Institute to use its communications tools.

Usage of P.I.T. Communications Tools
P.I.T. encourages students to make effective and efficient use of communication and learning tools, such as e-mail and Internet connectivity. Employees are encouraged to use (in addition to the above); voicemail, telephones, copiers and fax machines for the same purposes.

The Institute will allow the use of said tools for personal activities, providing that this use has no adverse effects on the productivity and work environment of others, and does not violate the guidelines established within this document. In all cases, the usage of Pennsylvania Institute of Technology’s communication and learning resources is subject to the discretion of the management. Employees should direct any questions about usage to their manager. Students should direct questions to the IT Director or their instructors

Inappropriate Use of Communications Tools
Employees may not use Institute-owned communication tools for inappropriate purposes. Whether a purpose is inappropriate rests with the discretion of management. Inappropriate use of Institute-owned communication tools, includes, but is not limited to, usage that:

1. Causes sending of unsolicited or “large group” emails (Spamming)
2. Improperly discloses confidential or proprietary information
3.Furthers unethical, immoral or illegal purposes
4. Amounts to threatening or offensive conduct, such as:
a. Accessing, forwarding, and/or photocopying inappropriate items, including, but not limited to, pornographic, sexist, racist, or other such material (e.g., photos, drawings or jokes)
b. Making derogatory or vulgar statements regarding sex, race, color, national origin, ancestry, citizenship, religion, age, physical or mental disability, medical condition, sexual orientation, veteran or marital status
5.Conducts business activities not related to P.I.T.
6.Exceeds reasonable use for non-P.I.T. activities causing an interference with work productivity or more than nominal cost to the Institute
7.Violates any other Institute policy (solicitation, copyrights, trademarks, etc.)
8.Allows a person other than a P.I.T. employee or an individual authorized by P.I.T. to use the Institute’s communications resources

Any employee or student using P.I.T. owned communication tools inappropriately will be subject to disciplinary action, up to and including termination or dismissal/expulsion.

Expectation of Privacy
The privacy of e-mail and Intranet/Internet usage is subject to P.I.T.’s appropriate business and operating needs, Institute policies, and applicable laws. Pennsylvania Institute of Technology operations and network staff may access e-mail in the course of normal systems maintenance, network administration or problem resolutions. In addition, management may authorize the monitoring of e-mail usage to investigate inappropriate use or illegal activities. Depending upon the circumstances, this may involve the reading, decryption, and/or disclosure of e-mail messages. Similarly, as part of standard computer systems administration, the Institute keeps logs of Internet usage activity that may be used by authorized personnel to investigate performance concerns, security incidents (i.e., network/system intrusions, inappropriate use or virus attacks), or for other business purposes

Guidelines for Violations of Corporate Policy


I. Sending or accessing extreme material
Extreme Material is considered to be:
1.Child pornography of any type
2.Material that advocates violence toward others
3.Material depicting human beings engaged in sexual activity

Sending Extreme Material May Result in Termination or Expulsion.
Accessing Child Pornography on the Internet May Result in Termination or Expulsion.
Accessing Violent or Sexual Activity Material on the Internet Will Result in Termination if a Past Pattern of Such Behavior is Demonstrated.

If such a pattern (usually 3 or more instances) is not demonstrated, then the conduct will be subject to the two-step disciplinary process described in Section II below.

NOTE: If the file involves child pornography or violent material, the file will be reviewed for possible referral to an outside agency.

II. Sending or Accessing Offensive Material
Offensive Material is Considered to be:
1.Material depicting exposed male or female bodies
2.Material that creates a hostile work environment (e.g., material with a negative relation to sex, race, age, color, national origin, ancestry, citizenship, religion, disability, sexual orientation, marital status).

Sending or Accessing Offensive Material Will Result in the Following Two-Step Disciplinary Process:
First Offense:
Written warning given to employee and included in the employee’s file. A possible negative impact on the employee’s rating and/or compensation (depending on the severity of the offense) may now result. The warning letter should be given to the employee immediately upon completion of the investigation, and it is the responsibility of management, after consulting with the President, to insure that any adverse rating or compensation action is considered at the next rating cycle.

Second Offense:
Evaluation

III. Receiving Offensive Material Via E-mail
Receipt of Inappropriate Material by an Employee/Student Will Result in a Policy Reminder.
Student or staff member is to be contacted immediately upon discovery of offensive material, and given the appropriate warning.

Employees or students found to be receivers of Extreme or Offensive material should be given a standard written reminder of the Institute’s policy on this matter. This reminder will include suggestions for discouraging the sending of such material in the future, as well as appropriate actions they can take. Suggested actions include:
1.Responding directly to the sender with a request to cease sending such material
2.Reminding any P.I.T. employee/student who is sending such material that this is a violation of the school’s policies and must cease.
3.A meeting directly with their immediate supervisor or counselor to inform them of the situation

Repeated non-compliance with the above guidelines could result in disciplinary action.

NOTE: All P.I.T. employees and students should discourage individuals from sending them inappropriate material.

Summary of disciplinary actions to be taken:
1st Violation of Policy – Written or verbal warning
2nd Violation of Policy – Temporary Disabling of computer accounts and recommendation of disciplinary action
3rd Violation of Policy – Removal of account and recommendation for disciplinary action/suspension


Exceptions to the Disciplinary Guidelines
Any exceptions to the disciplinary approach defined in this document need to be approved by the President of the Institute.

P.I.T. Evacuation Policy

Identification / Notification
In the event of fire or smoke, activate the building fire alarm system to evacuate the building. Even if the fire is small, the alarm should be activated immediately as the fire could grow very quickly. All building occupants should be familiar with fire alarm pull station locations.

Evacuation

The primary concern in the event of a fire is the safe evacuation of the building. To accomplish this, all occupants must be prepared for a quick and orderly evacuation. All occupants should know primary and secondary evacuation routes. Periodic drills and/or meetings should be held to review these procedures. When the fire alarm sounds, immediate evacuation is required.

When evacuating the building, turn off any ventilation equipment, leave the room, turn off lights, and close the door behind you. Evacuation should be calm and safe. To prevent accidents, evacuees should leave by walking in a single file. If you encounter someone who is confused or unaware of the evacuation, usher them outside. Once outside, move away from the building. All evacuees should meet adjacent to the flagpole in front of the school.

NEVER ATTEMPT TO RE-ENTER A BURNING BUILDING.

Responsibilities
It is the responsibility of instructors to ensure students comply with evacuation procedures. Instructors shall secure their attendance sheets and escort students outside, closing all classrooms as they leave. Upon a safe evacuation to the front of the school, Instructors will compare attendance and ensure their students are all present. Attendance will then be submitted to the P.I.T. Administration. P.I.T. Administration will then relay this information to an officer on scene.

Students should NOT be allowed to leave their class group until everyone is safe. Students may leave only when everyone has been accounted for. The P.I.T. administration must authorize this departure and the police and fire department must agree. Students authorized to leave must do so calmly to ensure pedestrian and fire official safety.

Notification and Evacuation Procedures
Upon request, the ITS Department will assist departments in developing evacuation procedures and alternative emergency escape routes to be utilized by building occupants. This information should be posted in conspicuous locations throughout each area for easy reference by building occupants. The evacuation plan should be practiced twice a semester.

P.I.T. Administration to be notified that all the students are safe and accounted for:
John Strayer – President
Jack Bacon – Chief Information Officer
Donna Fabrizio – Dean of Student Services
Robert Hancox – Dean of Academic Affairs

Dispatched Companies
Rose Tree Fire Company - 73
Media Hook and Ladder Fire Company - 23
South Media Fire Company - 51
Springfield Fire Company - 44
Newtown Square Fire Company - 41

Ambulance, Medic 23
Medic 104-7

1. Press the CTRL, ALT, and DELETE keys simultaneously.
2. Click the "OK" button when presented with our banner message.
3. Enter your username (JSmith) in the username field.
4. Enter your password in the password field.
5. If this is your first time using a P.I.T. computer, see your supervisor for your initial default password.
6. Click the "Arrow Button" to log on.
To ensure greater security, passwords must meet a minimum standard for complexity. This will help prevent unauthorized use of your account through a “lucky guess.” Please use a mixture of numbers, symbols, uppercase and lowercase characters when creating a new password. Also, make your password at least six characters long.
1. Ch1 Incorrect – Too short
2. Chair Incorrect – Missing numbers or symbols
3. chair1 Incorrect – Missing capitalized letters
4. Joseph1 Incorrect – Should not include your name
5. Chair1 Correct! – A mixture of numbers or symbols, upper and lowercase
If this is your first time using a PIT computer, or your password has expired, you will receive a warning that you must change your password. Press OK and you will proceed to step 3 in the instructions below. If you make a mistake, the old password will be cleared from the box and must be re-entered.

How Do I Change My Password
1.Press the CTRL, ALT, and DELETE keys simultaneously after logging in.
2. Select "Change A Password..."
3. Enter the old or default password if it's not already there.
4. Enter your new password.
5. Confirm password.
6. Click the "Arrow Button" to finalize.
How Do I Log Off Of P.I.T. Computer
1. Go to the START globe in the lower left hand corner.
2. Click on the "Arrow" next to Shut down.
3. Click Log off
P.I.T. maintains an Emergency Messaging System (EMS) to notify you if there is an emergency, such as school closure due to weather. It is important to keep your information up to date, so you can be notified in the event of an emergency. If this is your first time logging in, you will automatically be prompted to update your EMS record shortly after logging in. Press “OK” to the EMS prompt and enter at least one valid phone number and email address.

How Do I Update My Contact Information For EMS?
1. Open a Web Browser
2. Go to 'http://my.pit.edu'
3. Click on the E.M.S. button
4. You will then be directed to my.pit.edu Login Portal.
5. Provide your Windows UserID for the username field and password.
6. Update your contact information.
7. Submit
P.I.T. maintains storage space on a server for employees to save important documents and work. This storage space is accessible over our network. Our computers see your personal storage space as a drive. It is named “H:” for home directory. If you save work to “Documents” or “Desktop”, it is only accessible on one computer. Work saved to the H: drive is accessible from any P.I.T. computer on campus.
How Do I Access My H: Drive
1. Click Start
2. Select 'Computer'
3. Click on the icon that says "[Your UserID$] (\\pitstorage) (H:)"