Recently Modified Articles

Have questions about RingCentral? We have answers!
This instructional page describes the "Risk Detail" page in OneTrust that explains how risks are quantified and remediated.
Overview of UTHSC's standard new PC configurations
ITS established a webpage explaining the information security requirements needed based on the data's classification level.
Use Word to edit PDFs. This method is best for causal users.
Have your system default to Acrobat for viewing PDFs
Find out what services ITS offers UTHSC students.
A step-by-step guide to converting a course to Ultra.
How to create a content area in a Blackboard course in order to build content.
Instructions on adding users to a course as secondary instructors.
Signing in to Adobe.com, installing desktop apps, signing out.
Learn which campus document signature solution you should use!
Students, learn about changes to your access to Microsoft 365 (including email), the UTHSC network, and other technology resources when you leave the university.
Employees, learn about changes to your access to Microsoft 365 (including email), the UTHSC network, and other technology resources when you leave the university.
What a student or faculty/staff should do if they don't have access to Banner.
Linkedin Learning - no cost to you training for faculty, staff, and students!
This guidance is for those completing assessments in the GRC application, OneTrust, especially on using the "Comments" tab to flag the question for more information.
This short tutorial is an overview of how to respond to risk assessments
Learn how to get Zoom updates.
You must choose the SSO option when logging into the Zoom app to get Zoom pro benefits.
Learn how to block annoying robocalls in RingCentral!
This is an explanation of how you can reactivate a Duo Mobile device.
Instructions for account owners to enroll users in Duo so they can continue to directly log in to a departmental account
Data sanitization is the process of irreversibly removing or destroying data stored on a memory device (hard drives, flash memory / SSDs, mobile devices, CDs, DVDs, etc.) or in hard copy form. It is important to use the proper technique to ensure that all data is purged.