You may be trying to access this site from a secured browser on the server. Please enable scripts and reload this page.
Turn on more accessible mode
Turn off more accessible mode
Skip Ribbon Commands
Skip to main content
Turn off Animations
Turn on Animations
To navigate through the Ribbon, use standard browser navigation keys. To skip between groups, use Ctrl+LEFT or Ctrl+RIGHT. To jump to the first Ribbon tab use Ctrl+[. To jump to the last selected command use Ctrl+]. To activate a command, use Enter.
Browse
Tab 1 of 3.
Page
Tab 2 of 3.
Publish
Tab 3 of 3.
Follow
Home
Currently selected
Policies
It looks like your browser does not have JavaScript enabled. Please turn on JavaScript and try again.
Updated Pages
Passwords
Home
SharedMailboxes
ResourceMailboxes-HowTo
OneDrive-for-Documents-Desktop
Documents
Recent
Return to Work Scheduling
Documents
Links
Presentations
Site Contents
Policies
University of Utah Computing Policies:
PHI Breach Notification:
http://www.secureit.utah.edu/policies/breach/index.html
Resource Security Policy:
http://www.secureit.utah.edu/policies/itresource.html
Network Acceptable Use:
http://www.secureit.utah.edu/policies/netuse.html
U of U computer Acceptable Use:
http://www.secureit.utah.edu/policies/aup.html
University of Utah Information Security web page:
http://www.secureit.utah.edu/
Purchasing
- hardware, software, printers, etc