New Employee IT Resources (2024)

As a new employee at Penn State New Kensington you have a number of essential steps to complete in order to successfully use the technology on campus as well as to ensure the security of your identity and University data. Complete/review the following items within the first few days of your employment.

1. Activating your Access Account and PSU id+ Card

Once HR creates your Access Account, you will receive an activation notification to an external email address (a non-Penn State email address that is on file at Penn State); the process is completed electronically. Your Penn State Access Account is used for logging into the campus computers and using essential computing services. More information can be found at the Access Account page: Penn State Access Accounts. If you need access to specific department IT resources, once you activate your Access Account, your supervisor must submit a request on your behalf to the NKITS Help Desk. If you forget your password you can reset it by going to theAccounts page,Forgot Password.

The PSU id+ card is Penn State's official identification card. It can be used for LionCash, library reservations, discounts, and much more. You must follow this process in order to get your ID+ card:

  1. Visit the IT Service Desk in 044 Blissell Library and Computer Center
  2. Present a valid driver's license, passport, state-issued photo ID, military ID, government-issued photo ID, high school photo ID with a Social Security Card, college ID with a Social Security Card, or a Permanent Resident Card to confirm your identity. Without one of these valid forms of ID, we cannot issue you an id+ card.
  3. Pose for your photo and wait for it to be printed

Learn more about id+ cards at the id+ website.

2. Enrolling in Multi-Factor Authentication (MFA)

MFA is an added security measure similar to how you protect your bank account with a pin number (something you know) and debit card (something you have) when you withdraw money from an ATM.

After you enroll in MFA, when you log in to WebAccess—Penn State’s online authentication system that protects Office365, Workday, Canvas, and more—you will enter your Penn State user ID (i.e., xyz5000) and password (something you know) as usual, and then use your smartphone or another device (something you have) to verify your identity.

Please keep in mind it is important to enroll more than one device (such as a smartphone and desk phone) in MFA to avoid difficulties authenticating if you lose or don’t have your only enrolled device with you. Instructions to do so can be found here

3. Microsoft Office 365 (Email, Calendaring and more)

Microsoft Office 365 empowers you to create, collaborate, and innovate through a host of email, calendaring, and premier applications that can be accessed from anywhere in the world, at any time, on any device. You can check your PSU email and manage your calendar at the following site: https://office365.psu.edu.

4. Phishing Training

Phishing is an attempt to steal your personal information, usually via a fraudulent email message or phone call. The people who do this pose as representatives of trusted, well-known organizations and ask for information that will allow them to impersonate their victims. Don't take the bait! Visit https://security.psu.edu/education-training/phishing/to learn how to protect yourself. To report a phishing email, please forward the message to [emailprotected].

5. Complete Information Security Awareness Training

All newly hired University faculty and staff are required to take the Information Security Awareness training within 30 days of receiving their Penn State Account. To access and receive credit for the training under Penn State’s Learning Resource Network (LRN), go to “My Training” and select “Information Security Awareness.” If the training does not show up in “My Training,” you can search for training in the LRN search bar in the upper right hand corner of the LRN main page once you’ve logged in.

6. Personally Identifiable Information (PII) Training

No PSU employee is permitted to electronically store or transmit any PII (sensitive data) on their University computer/devices. Examples of PII include credit card numbers, social security numbers, bank account information, and driver license numbers. For those that work with certain systems or information types must use a software program called “Spirion” on a weekly basis to ensure PII is not present:

  • Systems in units/areas storing and processing financial data
  • Financial officers
  • Financial aid data
  • PCI environments
  • Anyone within HR including strategic partners and consultants
  • Data that falls under the Gramm-Leach-Bliley Act (GLBA)
  • Systems with Protected Health Information (PHI) or Personally Identifiable Information (PII)
  • HIPAA covered components
  • Systems with Level 3/Level 4 data that have not yet been moved into an enclave
  • Police services
  • Risk Management

Spirion is used to scan all of the files on your computer to find sensitive information. If found, you must delete it using this software tool. More information about Spirion and training resources can be found athttps://security.psu.edu/services/spirion/.

7. Review the Safeguards for Keeping Penn State Data Secure

Protecting information begins at the individual employee level, regardless of your role at the University. It is important that we all practice responsible data stewardship to ensure that Penn State data is kept secure. Please review the Penn State's Information Classification website to better understand the different categories of data, where different types of data are permitted to be stored, and when data needs to be destroyed.

8. Read and Review University Information Technology (IT) Policies

Read and make sure you understand applicable University Information Technology policies.

9. Network Storage and Data Backup

You are responsible for backing up your Penn State files and data. File storage resources can be found at http://newkensington.psu.edu/information-technology and additional information about Data Backup and Retention Procedure PSU-NK-ITS-012 can be found at https://newkensington.psu.edu/information-technology-policies. The preferred method of storage is Penn State's Office 365 environment. Additional information on what types of data can be stored where can be found at https://security.psu.edu/awareness/storage/.

Additional Resources

Service Desk Incidents/Requests

Having an issue with a computer, printer, or phone? Need help creating marketing materials? Visit the Campus Work Order/Request website to submit a formal incident/request. Sufficient lead time is required in order to guarantee fulfillment of your requests. See the forms on the Campus Work Order/Request website for more information about the required lead-times.

Teams Phone & Voicemail Resources

Most calls throughout the university are now handled through Microsoft Teams after the conclusion of the Telephony Transformation project. General information can be found here:

Retrieve Voicemail:

For a variety of video tutorials and how-to articles regarding functionality such as call forwarding, transferring, merging, voicemail, and other information:

Printing/Copying/Faxing

There are multiple copiers strategically located across the campus for full-time faculty and staff printing.For more sensitive documents you can send jobs to the copiers securely by using the "Locked Print" feature. Youmustenter the last 5 digits of your PSU ID numberto perform the copy and faxfunctionsat the copiers. Faxing capabilities are available via the copiers in the Mailroom and Continuing Education.

Printing for adjunct faculty is available in the Adjunct Office (Arbuckle 011).

Additional Copier Resources

IM C4510 Online Manual
IM C300 Online Manual

Video Conferencing and Media Management

Zoom video conferencing allows you to engage in multi-person video or audio meetings using software installed on your computer, without the need for dedicated video conferencing hardware. Zoom combines cloud video conferencing, simple online meetings, group messaging, and a software-defined conference room solution into one easy-to-use platform. You can log into your PSU Zoom account using your PSU username and password.

Free Software Downloads

Software at Penn Stateis committed to providing you with the software that enhances your ability to get things done. We strive to offer these software titles at rates that are much lower than you would find elsewhere. Feel free to browse the products available to you.

Wireless Access

Wireless internet access is available on most of the Penn State New Kensington campus. A guide to easily set up your personal phone/computer for Wireless can be found at http://wireless.psu.edu.

New Employee IT Resources (2024)

FAQs

What are the 5 C's of employee onboarding? ›

From the very first day of employee onboarding, the 5 Cs – Clarity, Compliance, Culture, Connection, and Check-In – serve as crucial pillars that support an effective onboarding process.

How would you best describe your onboarding answers? ›

Onboarding is the process of integrating new hires into the workplace, helping them understand their work environment, company culture, and making them feel welcomed. It's crucial as it helps new hires reach productivity faster, improves employee retention, and is particularly important for remote employees or interns.

How to answer an onboarding survey? ›

5-answer Likert scale employee satisfaction survey questions
  1. The instructions and expectations for my role were clear during the onboarding process. ...
  2. The onboarding process prepared me well for my role. ...
  3. I was satisfied with the training and resources provided during onboarding.
May 14, 2024

Why is onboarding so difficult? ›

The biggest hurdle for onboarding is that no one's taking ownership and everyone is seeing it from the wrong point of view: That onboarding is merely an induction process. That onboarding is solely HR's kingdom. That onboarding is all checklists, regulatory compliance, and paperwork red tape.

What are the 4 pillars of effective onboarding? ›

The 4 Cs of effective onboarding for employees – Compliance, Clarification, Culture, and Connection – are the pillars that uphold the structure of a successful onboarding process. Each 'C' represents a critical area of focus that together creates a comprehensive and engaging experience for new employees.

What is a sample sentence for onboarding? ›

The bank has comprehensively reviewed its client onboarding. Look at all aspects of the onboarding process, making sure that you haven't set recruits up to fail.

Can you please explain your onboarding experience? ›

Sample Answer: Yes, I found the onboarding process helpful. It provided a solid foundation for me to transition smoothly into my new role and understand the company's expectations. This rating decides whether employees will stay with the company in the long run.

How do you impress during onboarding? ›

How to impress new hires: 8 ways to create a phenomenal Onboarding experience
  1. Prepare a Welcome Letter. ...
  2. Put together a Starter Booklet. ...
  3. Put together a Welcome Box. ...
  4. Offer to take them out to lunch on their first day. ...
  5. Ensure the technology is ready. ...
  6. Take a tour through the office.

How do you respond to onboarding? ›

For example, you can say, “I'm thrilled to be joining the team and can't wait to start contributing to our shared goals” or “I'm eager to learn from my new colleagues and bring my expertise to the table.” Demonstrating your excitement and willingness to be a team player will not only leave a good impression but also ...

How do you know onboarding was successful? ›

How do you know if onboarding was successful? To know whether your onboarding process was successful, tracking metrics is critical. The five best ways to measure onboarding success are: New hires' job satisfaction, time to productivity, overall morale, employee turnover, and hiring managers' performance.

How do I give feedback after onboarding? ›

Giving Feedback to New Employees: 56 Examples
  1. “Your contribution to the team over the past few (weeks) has been invaluable.”
  2. “I want to congratulate you on meeting your onboarding goals.”
  3. “You've made terrific progress in your first (2 months) in the role.”

What is the biggest challenge on onboarding? ›

Top 5 onboarding challenges and solutions
  • Information overload.
  • Lack of role clarity.
  • Slow onboarding process.
  • Unclear communication & feedback.
  • Disconnected culture.
May 23, 2024

What are the most common mistakes during the onboarding process? ›

Top five employee onboarding mistakes
  • Relying too much on job shadowing. ...
  • Avoiding looking at employees' emotional needs. ...
  • Offering as little training as possible. ...
  • Refusing to change or improve the process. ...
  • Waiting until their first day to begin onboarding.
Jan 26, 2024

What is a bad onboarding process? ›

Lack of communication: New employees are often not given enough information about their role, responsibilities, or the company culture. This can lead to confusion and frustration. Lack of engagement: Onboarding can be a passive experience, where new employees are simply given a lot of information to read.

What are the five core pillars of the onboarding process? ›

These have since evolved into the 5 “C's” of Onboarding: Compliance, Clarification, Confidence, Connection, and Culture.

What are the 6 C's of employee onboarding? ›

Add steps you may have missed to your onboarding checklist. The 6 C's are: Compliance, Clarification, Confidence, Connection, Culture, and Checkback.

What are the 4 C's of employee onboarding? ›

The 4 Cs of onboarding – Compliance, Clarification, Culture, and Connection – offer a structured and comprehensive approach to ensure that new hires are not only well-oriented but also fully engaged with the company's ethos and goals.

What are the 5 C's of employee engagement examples? ›

To foster employee engagement, many experts suggest following the 5 Cs strategy: Care, Connect, Coach, Contribute, and Congratulate.

Top Articles
Latest Posts
Article information

Author: Twana Towne Ret

Last Updated:

Views: 6513

Rating: 4.3 / 5 (44 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Twana Towne Ret

Birthday: 1994-03-19

Address: Apt. 990 97439 Corwin Motorway, Port Eliseoburgh, NM 99144-2618

Phone: +5958753152963

Job: National Specialist

Hobby: Kayaking, Photography, Skydiving, Embroidery, Leather crafting, Orienteering, Cooking

Introduction: My name is Twana Towne Ret, I am a famous, talented, joyous, perfect, powerful, inquisitive, lovely person who loves writing and wants to share my knowledge and understanding with you.