The University of Akron will never e-mail you and ask you to disclose or verify your UA password. If you receive a suspicious e-mail with a link to update your account information, do not click on the link--instead, report the e-mail to The University of Akron for investigation.
The University of Akron has many software packages available for university owned computers. If you do not already see the software you are looking for in Software Center you may be able to request it through the Software Request form or purchase it through the Computer Store.
As a member of the University of Akron you may need access to the PeopleSoft ERP system. To gain access you will need to complete the PeopleSoft Security Request form and go through an approval process. For more information on access and training please visit the PeopleSoft Information page.
In special situations it may be necessary to create guest accounts, i.e. SA/GA accounts, Distance Learning users, Police Academy users, conference attendees, incoming high school student groups, consultants etc. In these situations, sponsored guest accounts can be created.
The University of Akron Information Technology Services (ITS) will redistribute available previously used Windows laptops to current teaching Part-Time faculty. Availability is limited at times and is handled in a first request basis. When the teaching contract has ended the laptop is to be returned to ITS at the Computer Center. Please download and complete the form and return per the instruction with all appropriate signatures.
The University of Akron information security policies, institute controls used to protect The University of Akron data and IT Resources. While every exception to a policy or standard weakens protection for University IT Resources and underlying data, occasionally exceptions will exist. Please use security exemption form to detail why an exception is needed.
Exceptions granted increase the responsibility on the requester to safeguard University data or to manually provide the excepted service through another method that is verifiable and auditable.