The best way to request IT help is to e-mail email@example.com.
HES has a small IT staff and over 350 computers spread out among Stanley Hall, Gwynn Hall, Gentry Hall, McKee Hall, CFPR, MU School of Medicine plus commitments in the University Data Center and the central campus IT building. The above email address will reach all of us at the same time so that whomever is closest can get to you the quickest.
- IT Manager: Jonathan Weng firstname.lastname@example.org, 884-8940
- User Support Analyst: Joyce McReynolds email@example.com , 882-0117 (Gwynn)
- Student Assistant: TBD
- Web Designer: Amber Francis, firstname.lastname@example.org
- Instructional Designer: Julie Shults, email@example.com
- DoIT Help Desk: (limited help weekends and evenings) 882-5000
- Classroom Tech Support: (573) 882-5000, press #2
Available IT Services
We can help with configuring and repairing computers, printers, peripherals, research laboratory equipment. We can also help with installation and troubleshooting of software and updates, integration of emerging software technologies with legacy hardware systems, integrating cloud and server services with existing software and data
The newly revised UM Business Policy 1204 now requires that all technology purchases be approved by campus IT staff before purchase. Please work with HES IT for any hardware purchases, software purchases, web service subscriptions, etc. Even free software downloads and free web services have license and security considerations that may violate MU or grant security requirements. MU has a complex set of contracts and policies for technology procurement and we can help you navigate it. Many web services now also fall under the same procurement guidelines and data security guidelines as traditional software/hardware purchases. Technology purchases are often held up by campus procurement if IT has not previously signed off on the acquisition.
If you have questions about how you might use technology in the classroom, we can either help you or direct you to others on campus for help with things like: distance learning, video recording solutions, Smart Boards, hands‐on student computer classes, iPads in the classroom, etc.
For public classroom technology problems, contact the Campus Audio Video Equipment Support (CAVES) team. They provide technology support for the computer and AV equipment built into all centrally scheduled classrooms and auditoria. Phone: 573-882-5000, press #2.
We can help with a range of research oriented technology issues, like:
- Getting different lab devices and software packages to talk to each other.
- Technology specification and cost estimation for research grant applications.
- Planning and setup of new laboratory equipment and analytical software.
- Data storage and security compliance. We can provide guidance on free and paid options for data storage, backup, virtual software hosting, software update services, security access services, web site management, account creation/deletion.
Work through HES IT for disposal per MU data security and environmental safety guidelines of computers, printers, mobile devices, miscellaneous peripherals, and data storage media.
The MU Department of IT offers free computer training classes: http://doit.missouri.edu/training/.
The DoIT Help Desk can answer basic computer questions after normal College business hours (M-F, 8-5). Contact the MU help desk at 882-5000 for basic “How Do I?” evenings and weekends
Safe Computing Guidelines
- E-mail scams are everywhere… you really can’t be too paranoid. If you don’t recognize the sender or if something just seems fishy, don’t open attachments or click on links. Reading an email won’t hurt you, but opening an attachment or clicking on a link can.
- Suspicious links in email. If you hover your mouse pointer over an email link (DON’T CLICK) you will see a popup that shows the actual address where that link will lead. If it’s to a site different from what you would expect based on the content of the e-mail, especially if it is a link outside the US, then be very cautious.
- If you’re sure an email is junk then just delete it. Don’t even waste time examining it or reporting it. The campus receives so many bogus emails each week that campus IT staff can’t begin to investigate most of them. However, if you feel that something is particularly worrisome you can forward the email to firstname.lastname@example.org and it can be added to the campus spam filter.
- MU receives approximately one million e‐mails per day of which over 90% are rejected by the spam filters built into our email system. Even with the filters, some spam gets through. Just delete and ignore the few annoying junk emails that get through. If you ever see a large volume in a short period of time (double digits within a week) contact HES IT.
- Be cautious about commercial web sites, especially non‐work related web sites. Nearly all the dangerous stuff out there – like viruses and illegal materials – is from entertainment and other non‐work related sources. If they are giving something away for free, they are still making money from you either legally (through advertising, tracking and reselling data about your surfing and buying habits, etc.) or illegally (infecting your computer with a virus, stealing credit card info, clandestinely using your computer as a spam or porn server). If it’s a commercial web site, they are there to make money and not just to give you cool stuff for free. In general, if it isn’t work-related, try not to access it from work. In particular avoid these types of sites:
- Adult entertainment
- Online dating
- Online gaming
- Free music and video download sites
- Free software download sites
- Consider governmental and academic web sites to be generally safe (.edu, .gov). Exceptions to this are rare.
- Data security incidents are reportable to the MU Data Security office, the IRB, some granting agencies and law enforcement if necessary.
- Lock your door if you have a private office and avoid leaving your password on a post-it note out in the open.
- Whenever you step away from your computer use the Lock or Logoff options to prevent anyone else from doing anything inappropriate with your computer. The Lock option preserves everything on your screen exactly as‐is but requires you to type your password to continue where you left off. Logoff closes all your programs and requires a password for you to regain access to your computer. There have been many instances where a disgruntled coworker, angry student, etc. has snuck into someone’s office and either destroyed files on the computer or sent illegal emails out using the email account currently open on the computer. Lock and logoff prevent anything like this happening to you.
- Turn off your computer for the weekend to keep it more secure and save power. It’s ok to leave it on during the week as many software updates can be processed over night while you aren’t using your computer.
- NEVER share your password with anyone, including MU IT employees. University policy expressly prohibits sharing your password.
- The MU Data Classification Policy is the policy governing how various levels of data need to be protected and basically passes the responsibility off to the faculty/staff member to comply. This has an impact on things like use of cloud services (dropbox, etc.) and mobile computing devices (laptops, iPads, smartphones, memory sticks, portable hard drives). If you ever have ANY questions about how this policy relates to any data you handle (student info, fiscal info, research data) please contact HES IT.
- We support employees of the College using University owned computing devices. Part-time student employees (GRA’s, GTA’s, etc.) are included. We do not support personally owned computers, laptops, etc. Paid support for personally owned devices is available at TigerTech in the MU bookstore. We do not support students who are not employed by HES. All MU students have free use of the DoIT Help Desk (882‐5000) and free limited use of TigerTech in the MU Bookstore.
- Due to limited resources the College supports one primary computing device per person (laptop or desktop), plus mobile devices like iPhones/iPads and android smartphones. If you do have funds to buy a secondary laptop, be sure to also budget for fee‐based setup and support costs from outside the College.