Search

Help

Page 3 of 5. Showing 46 results (0.013 seconds)

  1. Access Control Procedures and Supplemental Guidance

    gain access to the VPN environment if:  Access required to perform a University approved business requirement.  A Suffolk employee. A Suffolk-sponsored … , or administrative reasons must have Suffolk sponsor designated to be the Point of Contact (POC) Active contract with the University Third-party user must
    ITS Information SecurityNov 05, 2021
  2. Getting Started with Technology

    of this package. If you need additional research or academic software, please speak first to your department chair, who will then contact us with your request.   4 … in your department), and the faculty research drive (Z drive, a common drive for all Business School faculty). Save class materials, research, and presentations
  3. Vendor Policy

    ethical norms. Examples of such information include: trade secret information, proprietary information relating to inventions or patents, research data, or personal information about volunteer research subjects collected in the course of human subject research. Security Incident: any event that is known or suspected
    ITS Information SecurityDec 18, 2023
  4. Financial Center Software

    icon_morningstar.GIF Morningstar Direct - a global investment analysis platform that unites all of Morningstar’s data and institutional research, private and third-party content, rigorous analytics, and productivity tools. icon_crspsift.png CRSP Sift - CRSP (Center for Research in Security Prices
  5. NVivo9-Getting-Started-Guide.pdf

    helps you to organize and easily access all of the items in NVivo: The items available in Navigation View include: • Sources—the collective term for your research … provides folders for your research materials. You can add folders under them to organize project items Drag the handle down to make more room Click a button
  6. Portable Device Policy

    or patents, research data, or personal information about volunteer research subjects collected in the course of human subject research. Portable Devices: Any
    ITS Information SecurityJun 20, 2013
  7. 0565 Scientific Misconduct Proceeding Records

    Description: Includes records related to research misconduct proceedings. Examples: Records may include allegations; evidence; correspondence; findings, recommendations and decisions of institutional officials or committees; and appeal related documents. Retention Period: Retain for 7 years from conclusion of last
  8. 0290 Prospect and Entity Files

    Description: Records relating to fundraising and other development-related efforts and communications with prospective donors and supporters. Examples: Records may include affiliations and relationships, phone-a-thon records, CR and GG, online community records, prospect tracking, research and profiles, biographical
  9. 0535 Tenure Records

    separation or termination plus 10 years, and then transfer to Archives. Authority: 151 M.G.L. § 15; 149 M.G.L. § 24D Research and Grants
  10. Training Bytes

    are 30-60 minute trainings designed to answer common technology questions in the areas of teaching & learning, research, and productivity. Have an idea for a session? Want to share how you are using technology in your course, train your colleagues on your favorite tool, or lead a discussion? We'd love to hear from