-
Accessibility Guidelines:
Cloud-Based Services:
-
The university will leverage cloud-based solutions to enhance accessibility, allowing users to access services and data remotely.
-
Faculty and staff are encouraged to utilize approved cloud platforms for collaboration and document sharing.
-
Clear guidelines and tutorials on cloud services and usage available in UD Website to facilitate easy implementation.
-
Virtual Private Network (VPN):
A. UD Staff are encouraged to use the university's VPN to securely access Campus Desktops and other ICT services from any location.
-
Support Services:
IT Helpdesk Support:
-
IT Helpdesk will be available to provide immediate assistance to users facing technical issues.
-
The helpdesk will offer multi-channel support, including Email Tickets, web portal and phone ensuring accessibility for all.
-
Work timing:
Monday – Thursday: 8:30 A.M. – 7:00 P.M.
Friday: 8:30 A.M. – 12:00 P.M. (Morning)
In person: IT Dept. UC building, First floor.
Phone: +971 4 5566 888
E-mail: ithelpdesk@ud.ac.ae
Web: reach.ud.ac.ae
-
Remote Technical Assistance:
A. Technical support teams will employ remote assistance tools to troubleshoot and resolve issues for users regardless of their location.
B. Comprehensive documentation and self-help resources will be accessible online for common technical queries.
-
Training and Awareness:
Online Training Modules:
-
Implement online training modules for users to enhance their ICT skills, catering to diverse learning styles.
-
Regular notification broadcasts will be conducted to address emerging technologies and best practices.
-
Communication and Awareness Campaigns:
A. Regularly communicate updates, announcements, and educational materials through accessible channels to ensure all users stay informed.
B. Promote awareness of available ICT services and support mechanisms through university-wide campaigns.
-
Data Security and Privacy:
Compliance Standards:
-
ICT services will adhere to industry-standard security protocols to protect user data and privacy.
-
Regular audits and assessments will be conducted on demand to ensure compliance with relevant data protection regulations.
-
Two-Factor Authentication (2FA):
A. Implement 2FA measures for secure access to university systems, adding an extra layer of protection for user accounts.
-
Continuous Improvement:
Feedback Mechanisms:
-
Establish survey feedback channels from QAIE department to gather input from users on their ICT service experience.
-
Regularly review and enhance policies and procedures based on user feedback and emerging technological trends.
-
Enforcement and Compliance:
-
Non-compliance with these policies may result in the restriction of ICT service access.
-
All university stakeholders are required to familiarize themselves with and adhere to these policies and procedures.
-
Review and Revision: