The Nest: Now Featuring Enhanced Communications and More!

As you may recall, The Nest, our new information portal, was released in the spring semester with a strong focus on addressing the immediate needs of our students.  We are pleased that the pilot launch of The Nest was met with a great response from our students and we continue to make enhancements to the portal to make it a more useful and convenient tool than MySJU.

In the current phase of The Nest project, we have widened our focus to deliver a content rich portal to our faculty and staff.  We have been working with campus constituents to gather feedback to ensure we capture the varied needs of SJU employees.

We are pleased to announce two new features are now available that have been developed as a result of the feedback we received:

Campus Communications: The Campus Communications portlet serves as a central location for information sharing and dialogue on current SJU issues.  In this section, you will find our Town Hall message board as well as direct links to Shared Governance, RCM and Middle States sites.

campus comm

Documents and Policies: The new Document Repository has been designed as a way to store all of the documents and forms that SJU employees regularly use in one convenient, secure location, organized by department.  You will no longer need to scour the web in order to find frequently used forms, policies, or other documents.  From this section, you can view or download needed forms directly to your computer.


As we get closer to retiring MySJU at the end of the Fall 2014 semester, we will continue to provide updates on the new features and improvements made to The Nest.  If you haven’t done so yet, please log into The Nest at and test-drive our new portal.  As always, we welcome and encourage your feedback.

If you have any questions about The Nest, please contact the TSC.

Wireless Devices and Services


The purpose of this document is to establish University policy and procedures for the procurement, possession, and use of wireless telecommunication devices and services. Wireless telecommunication devices include, but are not limited to, cellular telephones, two-way radios, smart phones, cellular modems and pagers (wireless device). This document provides guidelines to ensure that the use of a wireless device for University business is properly authorized and monitored and to ensure that the University is correctly reimbursed for chargeable personal use of University owned wireless devices.  Personal use of such devices should be limited to incidental use.  Taxability of the personal use of telecommunications devices is subject to IRS regulations.

User Qualifications

Employees may qualify for a wireless device only if the employee’s department head    has determined that such a device is a requirement for the performance of the employee’s job, the departmental budget manager has determined that funds are available in the budget, and the following criteria are met:

  • The job requires the employee to be mobile with direct client contact. Direct client contact means contact with SJU administrators, faculty, staff, students, alumni or other constituents related to the job; or
  • The job consistently requires timely and business critical two-way communications for which there is no reasonable alternative technology. (Note: In order to obtain approval for a PDA device, the job must require timely and business critical access to email via a wireless handheld device).
  • An employee’s eligibility based on these requirements must be documented by the department head on a Wireless Device Authorization Form, available from the Office of Information Technology.

Service Suppliers & Equipment

  • Procurement of wireless devices and services shall be the responsibility of the Office of Information Technology. Only the specific devices, cellular service suppliers and approved service plans sourced through the Office of Information Technology department may be used. The employee’s department will be charged for the wireless equipment and accessories, as well as for any installation and monthly service fees.
  • In consultation with the employee and budget manager, the Office of Information Technology will select a plan that satisfies the basic needs and coverage area required by the job, as well as the most cost effective plan. Taking into consideration that changes to usage plans often require extensions to contracts, usage plans will be reviewed and approved annually.
  • Invoices for wireless devices and services will be directed to Accounts Payable, who will pay the invoice.   Accounts Payable will send department heads an Approval Form to verify and approve the calls and charges. The department head or designee will sign the approval form and return it to Accounts Payable. In the event of any discrepancies or disputes, the responsible department head or designee must follow up with Accounts Payable for billing issues and the Office of Information Technology for non-billing issues.

Use of Wireless Devices

  • Employees shall use University-provided wireless devices for necessary, business-related purposes and should limit the use of these devices for personal reasons to incidental use only. All chargeable personal use must be reimbursed to the University.
  • Use of a University wireless device for private, commercial or consulting purposes is not permitted.
  • A wireless device is to be used only by the individuals or the department to whom it was issued.
  • Employees shall be responsible for the safekeeping, care and custody of any wireless device assigned to them.
  • Wireless devices that are no longer required because of termination of employment or change in job status shall be returned to the Office of Information Technology so that service can be terminated.
  • Any exceptions to the above must be approved by the employee’s respective divisional Vice President.

Reimbursement of Wireless Services

The University will reimburse employees for reasonable charges associated with University-related business calls placed on personally-owned wireless devices to the extent that such charges exceed the employee’s service plan.  Requests for reimbursement must be submitted on a properly completed and approved Business Expense Reimbursement form that is supported by the original bill, with the business purpose details of the charge to be reimbursed appropriately identified.

Mass Email Policy: Updated January 2014


Saint Joseph’s University recognizes that email is an efficient and cost-effective means for individuals and campus groups to reach large internal audiences. At the same time, members of the University community have expressed an aversion to unsolicited, mass-distributed internal email. Additional feedback further suggests that the overuse of such email adversely impacts the University’s ability to deliver messages of critical importance, which was the original intent of large email aliases like “employee.”

With these concerns in mind, this policy supports the following principle: SJU respects all community members and protects both the integrity and effectiveness of University messages by minimizing unsolicited, mass-delivered email communications. 

In addition to a policy reserving all-employee communications for official University messaging, there are supplemental issues related to system capacity and the security of protected information. It is the University’s responsibility to preserve an effective email system that safeguards personal information and promotes system-wide performance. With those and other objectives in mind, the University has re-written its Mass EMail Guidelines (May 2005) and put in place the following Mass EMail Policy (effective January 2014).


The Mass EMail Policy identifies instances in which mass email communications are permitted, how distribution of those messages is approved, and alternatives when the use of mass email is not appropriate. Its structure is guided by the federal CAN-SPAM Act, which created new regulations about the management of unsolicited email. Namely, all such unsolicited messages must include an opt-out mechanism. When members of an email community cannot opt out of a message stream, the owner – in this case Saint Joseph’s University – assumes a heightened responsibility to protect recipients from unsolicited messaging.

This policy restricts the use of the employee, empfac and empstaff aliases according to the authorization list below. These aliases meet CAN-SPAM criteria as follows:

• They reach all faculty and staff.

• Membership is required (“employee” and subsets) and there is no immediate opt-out (“fyi”).

• They were created with the intent of quickly communicating essential information.

Prior to this policy, no formal protocol governed their access or use.

Effective January 17, 2014, the University has eliminated the “fyi” alias and established formal criteria restricting access to the “employee” (and subset “empfac” and “empstaff”) aliases. Future broadcast emails can be sent only by authorized users and must meet one or more of the following conditions:

• Be critical, time sensitive and germane to the University’s mission or operations, as determined by the President’s Office, Senior Vice President, Provost’s Office, University Communications or Public Safety.

• Address an urgent issue of campus safety, health or operational status (e.g., weather alerts).

• Address a required/recommended activity that applies to all or the vast majority of suppressed alias recipients (e.g., Class Registration, Benefits Enrollment, Convocation).

• Be deemed otherwise essential by an authorized office (*) and carry the heading and signature of the division/department head.

(*) Authorized offices/officers include President’s Cabinet divisions, along with Campus Ministry, Dining Services, Drexel Library, Facilities, Jesuit Community, Payroll, Public Safety, Student Records and Financial Services, and Student Health. 


The offices of the President, Senior Vice President and Provost are authorized to send messages to the University community, as are division/department heads in University Communications and Public Safety.

The Office of Mission is authorized to approve messages on behalf of Campus Ministry. Administrative Services approves messages from Dining Services and Facilities. Human Resources (employee benefits and payroll) and Information Technology (I.T. service issues) are authorized to send messages related to their respective areas. The Jesuit Community will distribute its messages through the President’s Office.

All other mass email requests, unless approved and sent by an authorized officer or one of the remaining designated offices, will be evaluated on a case-by-case basis by the Office of University Communications with the primary goal of minimizing unsolicited messages. In addition, each week University Communications will distribute an internal electronic digest of events and announcements. All approved events submitted ( by the published deadline will be compiled and distributed to campus users in this manner. The first issue of This Week will appear on January 21, 2014.

Daily event reminders are currently available via the online SJU Events Calendar at Academic and administrative units are encouraged to post their events to this online calendar for maximum effect. The so-called “classifieds” previously permitted under the FYI alias should now be posted in the announcements section of MySJU. They will not be accepted for email or digest distribution.

Questions about the Mass EMail Policy may be directed to the Office of University Communications (x1222).


• Administrative Services

• Advancement

• Athletics

• Campus Ministry

• CAS Dean’s Office

• CAS Council

• Dining Services

• Drexel Library

• Enrollment Management

• External Affairs

• Facilities

• Faculty Senate

• Financial Affairs

• General Counsel

• Hawk Central

• HSB Dean’s Office

• HSB Council

• Human Resources

• Information Technology

• Jesuit Community

• Mission

• Payroll

• Planning

• President’s Office

• Provost’s Office

• Public Safety

• Senior Vice President


• Student Health

• Student Life

• University Communications

Policy Governing the Use of Computing and Network Resources

Mission Statement

To support the missions of teaching, research, and public service, Saint Joseph’s University provides access to computing and information resources for students, faculty, and staff, within institutional priorities and financial capabilities.

General Requirements

All members of the University community who use the University’s computing and information resources must do so responsibly. Every user is responsible for the integrity of these resources. All users of University-owned or University-leased computing systems must respect the rights of other computing users, respect the integrity of the physical facilities and controls, and respect all pertinent licenses and contractual agreements. It is the policy of Saint Joseph’s University that all members of its community act in accordance with these responsibilities, relevant laws and contractual obligations, and in the highest standard of ethics.

Computing facilities and accounts are owned by the University and are to be used for the University-related activities for which they are assigned. University computing resources are not to be used for commercial purposes or non-University-related activities without written authorization from the University. In these cases, the University may require payment of appropriate fees. This policy applies equally to all University-owned or University-leased computers.

The University reserves the rights to limit, restrict, or extend computing privileges and access to its information resources. Data owners–whether departments, units, faculty, students, guests or staff–may allow individuals other than University faculty, staff, and students access to information for which they are responsible, so long as such access does not violate any license or contractual agreement; University policy; or any federal, state, county, or local law or ordinance.

Users and system administrators must guard against abuses that disrupt or threaten the viability of all systems, including those at the University and those on networks to which the University’s systems are connected. Access to information resources without proper authorization from the data owner, unauthorized use of University computing facilities, continued overuse of resources that degrades system performance, and intentional corruption or misuse of information resources are direct violations of the University’s standards for conduct as outlined in the Saint Joseph’s University Policy Manual, the Personnel Policies and Procedures for Professional and Salaried Staff, the Faculty Handbook, and the Official Student Handbook and may also be considered civil or criminal offenses.

Saint Joseph’s University treats policy violations of computing facilities, equipment, software, information resources, networks, or privileges seriously. Disciplinary action is described in the section Penalties for Misuse of Computing and Information Resource Privileges.

System Administrator Responsibilities

  • Maintain size limits on user file systems and incoming email systems. These limits will change from time to time.
  • Detect weak passwords and contact users to change them to a stronger password.
  • Scan the network file systems for viruses and remove them. Notify users who repeatedly have viruses in their file space.
  • Investigate reports of problems caused by users on Saint Joseph ‘s network to internal or external computers or networks.

User Responsibilities

If you or your guest use the University’s computing resources or facilities, you have the following responsibilities in addition to those described in the preceding sections:

  • Use only those computer services, networks and accounts which the University has authorized for your access.
  • Use accounts only for the purpose(s) for which they have been issued.
  • Be responsible for all use of your accounts and for protecting each account’s password. Users are not allowed to divulge computer account passwords. Passwords should consist of a mix of 7 or 8 alphanumeric characters, and should be changed frequently throughout each semester of use. Do not use easily identifiable personal information such as names, telephone numbers, birth dates, etc.
  • Immediately report unauthorized use of your accounts to the Office of Information Technology.
  • University communications systems (electronic mail, electronic messaging, and similar services) may not be used for unlawful purposes or purposes that violate other University policies. The latter include, but are not limited to, sexual or other forms of harassment. Electronic communication may not be used for commercial purposes except under the direction of the University.
  • Ensure that all software that you use is properly licensed. Do not use or share unlicensed software including computer programs, music files and other digital media. The unauthorized sharing of music files and other digital media is a violation of the Digital Millennium Copyright Act and you are potentially liable for damages. Take reasonable and appropriate steps to see that all hardware and software license agreements are faithfully executed on any system, network, or server that you operate.
  • Cooperate with system administrator requests for information about computing activities. Under certain unusual circumstances, a system administrator is authorized to access your computer files.
  • You are held responsible for the actions of your guest(s). Violations of computing resource policy committed by any guest will be attributed to that guest’s sponsor.
  • You are responsible for making backup copies of your documents and personal software.
  • The use of electronic mail is to be treated as the use of postal services. Email messages are to be opened and read by the user to whom they are addressed. Do not attempt to read, delete or otherwise tamper with email addressed to another user. Do not attempt to distort or forge the “address” information of email messages. Do not send harassing or offensive email.
  • You may not attempt to gain control of any files or computers without the prior consent of the “owner” of those files. The system administrator does not give consent for users to attempt to gain control of any network servers, routers, or switches. The system administrator does not give consent for users to “look around” the file systems on any server.

If you are a project director for a group of computing users, a supervisor whose staff use computers, or a faculty member whose students use computers, you must help your project members, staff or students learn more about ethical computing practices and promote good computing practices and data management.

As an aid to a better understanding of responsible computing practices, all departments that own or lease computing equipment are encouraged to develop “Conditions Of Use” documentation for all systems that they operate and to make these “Conditions Of Use” documents available to users. These documents should be consistent with the policies and procedures set forth by the Office of Information Technology (for example, the Policy Governing Computing and Network Resouces at Saint Joseph’s University ) and should be approved by the department’s administrative officer or other individual designated by that administrative officer.

The University is not responsible for loss of information from computing misuse, malfunction of computing hardware or software, external contamination of data or programs. The staff in Information Technology units such as Network Services and all other system administrators must make every effort to ensure the integrity of the University’s computer systems and the information stored thereon. However, users must be aware that no security or back-up system is 100 percent foolproof.

Penalties for Misuse of Computing and Information Resource Privileges

Abuse of computing resources is subject to disciplinary action. If the Office of Information Technology has a sufficiency of evidence to indicate that intentional or malicious misuse of computing resources has occurred, and if that evidence points to the computing activities or the computer files of an individual, any or all of the following steps will be pursued to protect the user community:

  • Notify the user’s project director, instructor, academic advisor, or administrative officer of the investigation.
  • Refer the matter for processing through the University’s judicial system.
  • Suspend or restrict the user’s computing privileges during the investigation, including inspecting that user’s files, diskettes, and/or tapes. Disciplinary action may include the loss of computing privileges and other disciplinary sanctions up to and including non-reappointment, discharge, dismissal, and legal action. In some cases, an abuser of the University’s computing resources may also be liable for civil or criminal prosecution under Title 18 PA C.S. @5742 (1990), or other appropriate legislation.

It should be understood that nothing in this policy precludes enforcement under the laws and regulations of the Commonwealth of Pennsylvania, any municipality or county therein, and/or the United States of America.

All computer users are urged to become familiar with the University Policy of Academic Honesty as it pertains to the use and abuse of University computer resources, as well as the Policy Governing the Computing and Network Resources at Saint Joseph’s University. Any observed violations of these policies must be reported to the appropriate administrative officers and to the Office of Information Technology.

Use of Unlicensed Software

All software installed on the University’s computer systems must be properly licensed, either by the University, or by the individual user. The University will monitor its computer systems to ensure that unlicensed software is not installed on its computers. Individuals who install software on their office computers must keep records to show that this software is properly licensed, and they must inform Information Technology that the software has been installed.

Compliance with Copyright Laws for Text, Audio and Video

Nearly all written, audio and video material is protected by copyright laws, regardless of whether it is in a hard copy, in an electronic copy, or on the Internet. The exceptions to this rule are so few that users of SJU technology should assume that all written audio and video materials in hard copy or available through the Internet are protected by copyright laws, including The Digital Millennium Copyright Act of 1998, unless there is clear information to the contrary. Simply stated, the copyright laws allow a user to read the copyrighted material. The copyright laws do not allow a user to modify a copyrighted work, make copies of it (beyond those allowed by fair use), distribute copies of a work through the Internet, or broadcast a copy of a work (such as in the case of video) on any channel or network. As with materials from a library or other sources, the user is responsible for using materials obtained off the Internet in compliance with the copyright laws.

Compliance with Copyright Laws for Software

Nearly all computer software is protected by the copyright laws. The exceptions to this rule are so few that users of SJU technology should assume that all software on a SJU computer system, on third party systems, or available through the Internet is protected by copyright, unless there is clear information to the contrary. Simply stated, the copyright laws allow a user of software to use the software, load it onto the hard drive of a computer, and retain the original disk as an archive copy. The copyright laws do not allow a user to modify the software, make more copies of it, store copies on both a home and a campus computer, or distribute the software through the Internet, unless the license agreement permits those activities. Unless a user of SJU computer systems knows that any of those activities is permitted by the applicable license agreement, users of SJU computer systems shall not copy any software, modify any software, load copies of it onto a network or on multiple hard drives, or distribute the software in any way, including through the Internet.

TSC Laptop Program Support and Policies

Saint Joseph’s University is proud to offer our students a fully functional Technology Service Center (TSC) where they can bring their laptops for diagnoses and repair.

The TSC also offers students information on everything from running virus scans to connecting your video game consoles to our network. The TSC is located in the Science Center, Room 129.

Summer 2015 availability below:

Monday – Thursday 7:30am-7:00pm
Friday 7:30am-5:00pm
Phone: 610-660-2920 | Email: | Location: Science Center Room 129

Information on connecting your laptop to the SJU wireless network.

Technology Service Center Policy Statements

We the Technology Service Center, in order to provide a more professional environment, augment customer satisfaction and abide by applicable software laws, do ordain and establish this listing of policy statements.

  1. The Technology Service Center provides computer technical support for all currently enrolled Saint Joseph’s University students.
  2. Copying, viewing, or otherwise commandeering of documents, pictures and all other non-essential files from a user’s computer is strictly prohibited.
  3. Unless ownership is proven, we will not attempt to or break a password on a computer.
  4. The Technology Service Center will not format or re-image any laptop program computer without confirmation from the owner.
  5. The Technology Service Center is not responsible for data lost during service it performs on your computer. Please back up your data before sending your PC/Mac to be serviced by the Technology Service Center. The Technology Service Center will provide advice on backup strategies and will publish recommendations for backing up your computer.
  6. The Technology Service Center will not install any unauthorized or unlicensed software. Any software install requests must be provided with CD’s, license codes and documentation.
  7. All drop-off computers will have a minimum one (1) day wait. We will notify the student when the computer is ready. In the event a computer is not ready after a day or it needs to be sent out for repair, the TSC will update the user on the status of the computer.
  8. The uses of the University network and/or any file sharing software (i.e. Limewire, eDonkey, Kazaa, iMesh, Gnotella, etc.) to share, transmit, or receive copyrighted materials is illegal and strictly prohibited. Failure to comply may result in loss of your network account, network access privileges and/or further disciplinary action. More information on our Usage Policy is located at
  9. The Technology Service Center will not distribute The Nest or any other network related password via telephone or in person. Users are to reset their password through
  10. The Technology Service Center will not provide network support for non-residential students. (i.e. students residing in Lancaster Court, Drexel Apartments, Presidential Apartments, etc.)
  11. The Technology Service Center will not provide on site support for Saint Joseph’s University students. Students must bring their computer (Laptops or Desktops) to the Technology Service Center (Science Center 129) for service. We will provide on site support for network and phone jack problems.
  12. The Technology Service Center will not provide any technical support for wireless routers. Wireless routers are strictly prohibited in all network supported dorms.
  13. Only Technology Service Center employees are allowed in the Technology Service Center work area.

Heartbleed Bug Update

You may have seen recent news about the Heartbleed bug that can access your passwords and personal information on websites that use OpenSSL.  The Office of Information Technology wanted to make you aware of security that we have in place in order to protect your information.  Upon learning of the vulnerability, our systems were immediately patched and are now protected.

As a good security practice, if you choose to, you can reset your password by going to and clicking the link under the login boxes that reads “Forgot/Reset Password”.

It is important to also regularly reset passwords for other sites that you log into such as your bank, Gmail, credit card sites, etc and we encourage you to do so.

To see which sites have and have not been infected by Heartbleed, click here.

If you have any questions, please contact the TSC.

End of support for Windows XP

Microsoft has determined that support for its Windows XP operating system will end on April 8, 2014.  This means that there will no longer be security updates or technical support for computers running Windows XP. This also means that the TSC will not be able to provide support for Windows XP computers in our BYOD program.

There are still a number of computers on campus that are using Windows XP.  If you currently have an SJU owned computer running Windows XP, the Office of Information Technology or your IT Liaison will be reaching out to you to have your operating system updated.

If you are unsure what operating system your computer is running, please go to this

Full information about the implications of this update can be found on Microsoft’s website.

If you have any questions about this upcoming change, please contact the Technology Service Center.

The Nest has Arrived!

The Nest has arrived!


The Office of Information Technology would like to add to the excitement around campus (Go A10 Champs!) and debut our new university portal, The Nest!  As of this morning, The Nest is officially available at  We’ve worked hard to deliver students, faculty, and staff, an easier, more modern, and personalized way to access SJU-related resources online.


While we are excited to bring The Nest to our campus community, MySJU will still be available for some time to smooth the transition.  You will still be able to log into MySJU if you are unable to find the resource you need within The Nest.  We would also like to clarify that SJU’s incoming Class of 2018 will still have the ability to use MySJU throughout the Fall 2014 term.


Please, take some time to log into The Nest today and acquaint yourselves with the new portal.  In order to guide you through the new features and functionality of The Nest, we’ve made a video that you can access by clicking Learn More on the Home Page or visiting our blog.


We welcome and encourage your feedback! Please contact that TSC at, Tweet us @sjuit, or call 610-660-2920.