Telecommunication Systems at UTPA Telecommunication systems are utilized at The University of Texas -- Pan American in Edinburg, Texas (UTPA). They allow employees to be able to function on a highly technological and communicative wave link. The university has critical initiatives and goals to advance in the field of technology. The telecommunications can vary...
Telecommunication Systems at UTPA Telecommunication systems are utilized at The University of Texas -- Pan American in Edinburg, Texas (UTPA). They allow employees to be able to function on a highly technological and communicative wave link. The university has critical initiatives and goals to advance in the field of technology. The telecommunications can vary and include, but are not limited to: the internet hardware software networks, owned by UTPA.
The university provides the most responsive and up-to-date information systems and services, and the most feasible computer and network infrastructure that is technologically advanced and reliable. Telecommunication services are provided to all offices, staff, students, faculty, and staff affiliated with UTPA. UTPA has an initiative of distance learning, as well. Students are able to utilize distance services by taking class's off-campus with the use of a computer with an internet connection. The university make use of it grant award received in 2001 from the Telecommunications Infrastructure fund (TIF).
The TIF was created to fund telecommunications initiatives and distance learning projects in schools, libraries and hospitals throughout the state in the form of grants and loans. The Center for Distance Learning was granted money from the TIF fund. The Center was able to purchase and maintain hardware and software ever since, including: a digital camera, printers, computer work stations, personal computers, servers, laptop computers, WebCT software and other computer hardware, software and training.
The UTPA library was awarded a grant to purchase computer hardware and software to help students, including: Listening hardware, microfilm/microfiche scanner, laser printers, microfilm readers, laser printers, microfilm readers, tape recorders with microphones, reference computers, wireless computers, classroom computers, and graphics software. The TIF also funds TexShare, which provides dozens of databases for the library for student, staff, and faculty use. UTPA provides a service of allowing students, faculty, and staff to use e-mail, library services, and database accessibility off-campus.
Once an individual is an authorized user, for example, a student, a staff or faculty member, they will be able to access the information through the university network by using an authorized username and password. In addition to having these telecommunication devices, UTPA, holds high standards when it comes to information security. The university has policy and standards, promotes awareness, risk management, business recovery planning, incident management, data security, and technical security.
UTPA houses an Information Security office that continuously analyzes and assesses information security risk in critical state systems and develops appropriate safeguards and strategies to reduce loss exposure. Related practices include conducting risk analysis and assessment, assessing network and systems vulnerability, and developing and managing strategic and tactical plans. Data recovery is very important to UTPA, as well. In some instances, a failure to recover data may occur.
The information may be very important for a particular office to function properly and to offer the best services to its students, for example, a health office or disability services for students. This information is crucial to have, especially if it is on a database and highly confidential. The university has a policy and procedure in place in order to recover information if it was lost or not backed up.
The Information Technology office develops, installs, and monitors information security controls that assure the integrity and availability of University information resources. Related practices may include developing access and data management controls, and assessing the efficiency and effectiveness of these measures. This area also includes anti-virus support services for computers, in order to safe.
The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.
Always verify citation format against your institution's current style guide.