<div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small">Everyone,</div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small">They are extremely serious about this.  It is critical that you Step 1. make sure your cyber security training is up to  date, Step 2. you are using the latest/greatest multifactor authorization apps and protocols, and Step 3. start installing the security software on any computer (laptop or desktop, Apple or PC) that you use that connects to campus services (including email, google storage, library, etc).  There have already been instances of people having their access frozen until their training is complete, so you know what is coming next.  Presumably you all have completed Steps 1 and 2.</div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small"><br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small">With regard to the required software installation (Step 3), please read the hardware requirements carefully; however, the web pages that the IT communication folks have provided are extremely confusing and lead you down multiple incorrect rabbit holes with regard to hardware/software requirements.  I just got off the phone with Lily Barger (Director of IT computing support, but NOT Communications) who agrees the directions are anything but clear.  Here is what we figured out to do to allow your computers access.  </div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small"><br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small">For both Windows and Apple computers go here</div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small"><br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small"><a href="https://endpointinventory.ucr.edu/home">https://endpointinventory.ucr.edu/home</a></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small"><br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small"><br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small">For Windows:  Click on the Windows tab and go to near the bottom of the screen and follow the directions (link circled in red below) to find your Windows Device ID.  This will inform you if your computer can even attach to the campus services.   Then enter the ID where indicated (yellow field below) and follow the installation instructions.</div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small"><br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small"><img src="cid:ii_m9n2mlgn5" alt="image.png" width="503" height="349"><br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small"><br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small"><br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small">For Apple:  Click on the Apple tab and follow the same directions as for Windows above.</div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small"><br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small"><img src="cid:ii_m9n2q4li6" alt="image.png" width="503" height="249"><br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small"><br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small"><br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small"><br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small">Now, somebody please tell me why the people who are responsible for communications are the least able to communicate clearly.</div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small"><br></div><div class="gmail_default" style="font-family:verdana,sans-serif;font-size:small">Rick</div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">---------- Forwarded message ---------<br>From: <strong class="gmail_sendername" dir="auto">UCR Information Technology Solutions via Faculty</strong> <span dir="auto"><<a href="mailto:faculty@scotmail.ucr.edu" target="_blank">faculty@scotmail.ucr.edu</a>></span><br>Date: Fri, Apr 18, 2025 at 9:16 AM<br>Subject: [Faculty] Your Action is Required: UC Cybersecurity Mandate<br>To:  <<a href="mailto:faculty@scotmail.ucr.edu" target="_blank">faculty@scotmail.ucr.edu</a>><br>Cc: UCR Information Technology Solutions <<a href="mailto:its@ucr.edu" target="_blank">its@ucr.edu</a>><br></div><br><br><div><div><div dir="ltr"><div><div role="button"><div role="button"><span></span></div></div><div role="button"><div role="button"><span></span></div></div></div><div><div role="main" dir="ltr" style="outline:none"><table role="presentation" cellpadding="0" cellspacing="0" border="0" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td><table role="presentation" cellpadding="0" cellspacing="0" border="0" style="margin:auto;border-collapse:collapse;border-spacing:0px" align="center"><tbody><tr><td width="100%" align="center"><table role="presentation" cellpadding="0" cellspacing="0" border="0" width="100%" style="background-color:rgb(255,255,255);background-size:cover;display:table;table-layout:fixed;width:100%;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%"><table width="100%" style="margin:auto;max-width:800px;min-width:320px;border-collapse:collapse;border-spacing:0px" align="center"><tbody><tr><td style="min-width:12px"></td><td width="100%" style="padding:9px 0px"><table width="16.666666666666664%" style="vertical-align:top;border-collapse:collapse;border-spacing:0px"></table><table width="66.66666666666666%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="0px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><div style="overflow:hidden"><img src="cid:ii_m9mzfq1u0" alt="image" style="height:auto;display:block;width:100%;border:0px" width="272" height="50"></div></td></tr></tbody></table></td></tr></tbody></table><table width="16.666666666666664%" style="vertical-align:top;border-collapse:collapse;border-spacing:0px"></table></td><td style="min-width:12px"></td></tr></tbody></table></td></tr></tbody></table><table role="presentation" cellpadding="0" cellspacing="0" border="0" width="100%" style="background-color:rgb(248,249,250);background-size:cover;display:table;table-layout:fixed;width:100%;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%"><table width="100%" style="margin:auto;max-width:800px;min-width:320px;border-collapse:collapse;border-spacing:0px" align="center"><tbody><tr><td style="min-width:12px"></td><td width="100%" style="padding:9px 0px"><table width="100%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><div id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.g22gtpjccjwr" style="margin-bottom:0px"></div><h1 id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.g22gtpjccjwr_l" dir="ltr" style="text-align:center;margin:0px 0pt;padding-top:0px;padding-bottom:0px;font-size:20pt;font-family:Arial;font-weight:700;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;padding-left:0pt;text-indent:0pt;color:rgb(0,61,165);outline:none"><span>Your Action is Needed for UCR to Meet the UC Cybersecurity Compliance Deadline</span></h1></td></tr></tbody></table></td></tr><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><p dir="ltr" style="margin:0px 0pt 0pt;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span>Colleagues, </span></p><p dir="ltr" style="font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;margin:6pt 0pt 0pt;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span>We are nearing the deadline to meet new cybersecurity requirements issued by the UC Office of the President. To be in compliance, </span><span style="font-family:Arial;font-weight:700">all </span><span style="font-family:Arial;font-weight:700">devices</span><span> that connect to secure UCR resources must utilize the UCR security toolset. </span></p><p dir="ltr" style="font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;margin:6pt 0pt 0pt;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span>If you perform university work using a device that is not managed by UCR IT, you must take action now to install and use the toolset or risk being unable to access campus resources in the future. Computers, laptops, and Microsoft Surface tablets, including those purchased with grant funding, are subject to the mandate. If you use a personal device and wish to continue using it to connect to campus resources on and off campus, you must install and use the toolset on that device. </span></p><p dir="ltr" style="font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;margin:6pt 0pt 0pt;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span>More guidance, including information about your role in this process, can be found below. </span></p><p dir="ltr" style="font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;margin:6pt 0pt 0pt;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span>Thank you for your attention to this urgent matter and for doing your part to keep our Highlander community safe.  </span></p><br><p dir="ltr" style="font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;margin:6pt 0pt 0pt;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span>Sincerely, </span></p><p dir="ltr" style="font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;margin:6pt 0pt 0pt;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span style="font-family:Arial;font-weight:700">Elizabeth Watkins </span></p><p dir="ltr" style="font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;margin:6pt 0pt 0pt;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span style="font-style:italic">Provost and Executive Vice Chancellor</span></p><p dir="ltr" style="font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;margin:6pt 0pt 0pt;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span style="font-family:Arial;font-weight:700">Matthew Gunkel </span></p><p dir="ltr" style="font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;margin:6pt 0pt 0pt;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span style="font-style:italic">Chief Information Officer and Associate Vice Chancellor </span></p><p dir="ltr" style="font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;margin:6pt 0pt 0pt;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span style="font-family:Arial;font-weight:700">Dewight F. Kramer </span></p><p dir="ltr" style="margin:6pt 0pt 0px;padding-bottom:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span style="font-style:italic">Chief Information Security Officer </span></p></td></tr></tbody></table></td></tr></tbody></table></td><td style="min-width:12px"></td></tr></tbody></table></td></tr></tbody></table><table role="presentation" cellpadding="0" cellspacing="0" border="0" width="100%" style="background-color:rgb(255,184,28);background-size:cover;display:table;table-layout:fixed;width:100%;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%"><table width="100%" style="margin:auto;max-width:800px;min-width:320px;border-collapse:collapse;border-spacing:0px" align="center"><tbody><tr><td style="min-width:12px"></td><td width="100%" style="padding:9px 0px"><table width="16.666666666666664%" style="vertical-align:top;border-collapse:collapse;border-spacing:0px"></table><table width="66.66666666666666%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="0px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><table role="button" width="100%" border="0" cellspacing="0" cellpadding="0" style="border-collapse:separate;table-layout:fixed;border-spacing:0px"><tbody><tr><td style="display:table-cell;text-align:center;overflow:hidden;line-height:36px;background-color:rgb(0,61,165);color:rgb(249,249,249);border:1px solid rgb(0,61,165);text-overflow:ellipsis;white-space:nowrap;height:27pt;font-size:12pt;font-family:Arial;font-weight:400;font-style:normal;padding-left:6px;padding-right:6px;width:100%;border-radius:4px;max-width:100%;vertical-align:middle"><a href="http://endpointinventory.ucr.edu/home" style="background-color:rgb(0,61,165);color:rgb(249,249,249);border-color:rgb(0,61,165);width:100%;text-decoration:none" target="_blank"><span style="overflow:hidden;text-overflow:ellipsis;white-space:nowrap;text-align:center;width:100%">Download the UCR Security Toolset</span></a></td></tr></tbody></table></td></tr></tbody></table></td></tr></tbody></table><table width="16.666666666666664%" style="vertical-align:top;border-collapse:collapse;border-spacing:0px"></table></td><td style="min-width:12px"></td></tr></tbody></table></td></tr></tbody></table><table role="presentation" cellpadding="0" cellspacing="0" border="0" width="100%" style="background-color:rgb(255,184,28);background-size:cover;display:table;table-layout:fixed;width:100%;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%"><table width="100%" style="margin:auto;max-width:800px;min-width:320px;border-collapse:collapse;border-spacing:0px" align="center"><tbody><tr><td style="min-width:12px"></td><td width="100%" style="padding:9px 0px"><table width="100%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><p dir="ltr" style="line-height:1.656;text-align:center;margin:0px 0pt;padding-bottom:0px;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span style="color:rgb(0,0,0);font-size:11pt;font-style:italic;vertical-align:baseline">Installation guides are available for</span><a href="https://ucrsupport.service-now.com/ucr_portal?id=kb_article_view&sysparm_article=KB0012265" style="color:inherit;text-decoration:none" target="_blank"><span style="color:rgb(0,0,0);font-size:11pt;font-style:italic;vertical-align:baseline"> </span><span style="color:rgb(17,85,204);font-size:11pt;font-style:italic;text-decoration:underline;vertical-align:baseline">Windows</span></a><span style="color:rgb(0,0,0);font-size:11pt;font-style:italic;vertical-align:baseline"> and</span><a href="https://ucrsupport.service-now.com/ucr_portal?id=kb_article_view&sysparm_article=KB0012269" style="color:inherit;text-decoration:none" target="_blank"><span style="color:rgb(0,0,0);font-size:11pt;font-style:italic;vertical-align:baseline"> </span><span style="color:rgb(17,85,204);font-size:11pt;font-style:italic;text-decoration:underline;vertical-align:baseline">MacOS</span></a><span style="color:rgb(0,0,0);font-size:11pt;font-style:italic;vertical-align:baseline"> users.</span></p></td></tr></tbody></table></td></tr></tbody></table></td><td style="min-width:12px"></td></tr></tbody></table></td></tr></tbody></table><table role="presentation" cellpadding="0" cellspacing="0" border="0" width="100%" style="background-color:rgb(255,255,255);background-size:cover;display:table;table-layout:fixed;width:100%;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%"><table width="100%" style="margin:auto;max-width:800px;min-width:320px;border-collapse:collapse;border-spacing:0px" align="center"><tbody><tr><td style="min-width:12px"></td><td width="100%" style="padding:9px 0px"><table width="100%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="0px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><table role="presentation" width="100%" cellspacing="0" cellpadding="0" border="0" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" height="40" style="height:40px"></td></tr></tbody></table></td></tr></tbody></table></td></tr><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><div id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.iianyn8hriff" style="margin-bottom:0px"></div><h1 id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.iianyn8hriff_l" dir="ltr" style="text-align:center;margin:0px 0pt;padding-top:0px;padding-bottom:0px;font-size:20pt;font-family:Arial;font-weight:700;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;padding-left:0pt;text-indent:0pt;color:rgb(0,61,165);outline:none"><span style="font-variant:normal">Guidance</span></h1></td></tr></tbody></table></td></tr></tbody></table></td><td style="min-width:12px"></td></tr></tbody></table></td></tr></tbody></table><table role="presentation" cellpadding="0" cellspacing="0" border="0" width="100%" style="background-color:rgb(255,255,255);background-size:cover;display:table;table-layout:fixed;width:100%;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%"><table width="100%" style="margin:auto;max-width:800px;min-width:320px;border-collapse:collapse;border-spacing:0px" align="center"><tbody><tr><td style="min-width:12px"></td><td width="100%" style="padding:9px 0px"><table width="33.33333333333333%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><div id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.e40l9marlswy" style="margin-bottom:0px"></div><h2 id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.e40l9marlswy_l" dir="ltr" style="text-align:center;margin:0px 0pt;padding-top:0px;padding-bottom:0px;font-size:16pt;font-family:Arial;font-weight:700;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;padding-left:0pt;text-indent:0pt;color:rgb(0,61,165);outline:none"><span>Resources</span></h2></td></tr></tbody></table></td></tr><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><p dir="ltr" style="margin:0px 0pt 0pt;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span>What's my role? View your checklist:</span></p><ul style="list-style-type:square;margin:6px 0px 0px;padding:0px"><li dir="ltr" style="margin:0px 0px 0px 15pt;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;font-size:12pt;color:rgb(28,28,28);text-decoration:inherit;outline:none"><p dir="ltr" role="presentation" style="margin:0px 0pt;padding-left:0pt;text-indent:0pt;padding-bottom:0px;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;font-size:12pt;color:rgb(28,28,28);outline:none"><a href="https://docs.google.com/document/d/1h0kCYKFfb41sInBec-Bqc8EtRs-fqu08Jesv3mrVmh8/edit?usp=sharing" style="color:inherit;text-decoration:none" target="_blank"><span style="text-decoration:underline;color:rgb(0,61,165)">I manage my device</span></a></p></li><li dir="ltr" style="margin:6px 0px 0px 15pt;padding-bottom:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;font-size:12pt;color:rgb(28,28,28);text-decoration:inherit;outline:none"><p dir="ltr" role="presentation" style="margin:0px 0pt;padding-left:0pt;text-indent:0pt;padding-bottom:0px;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;font-size:12pt;color:rgb(28,28,28);outline:none"><a href="https://docs.google.com/document/d/173rXeikz-Ko5-qjOm4WUVhRVRcntpCIGKhCF4iHiToA/edit?usp=sharing" style="color:inherit;text-decoration:none" target="_blank"><span style="text-decoration:underline;color:rgb(0,61,165)">IT manages my device</span></a><span> </span></p></li></ul><br><p dir="ltr" style="margin:6pt 0pt 0px;padding-bottom:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span>Find answers to FAQs about the </span><a href="https://its.ucr.edu/cybersecurity-mandate-2025#faq" style="color:inherit;text-decoration:none" target="_blank"><span style="text-decoration:underline;color:rgb(0,61,165)">mandate</span></a><span> </span><span>and the </span><a href="https://its.ucr.edu/uc-security-toolset#security-toolset-faq" style="color:inherit;text-decoration:none" target="_blank"><span style="text-decoration:underline;color:rgb(0,61,165)">security toolset</span></a><span>.</span></p></td></tr></tbody></table></td></tr></tbody></table><table width="33.33333333333333%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><div id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.y5bzjgjzoj54" style="margin-bottom:0px"></div><h2 id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.y5bzjgjzoj54_l" dir="ltr" style="text-align:center;margin:0px 0pt;padding-top:0px;padding-bottom:0px;font-size:16pt;font-family:Arial;font-weight:700;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;padding-left:0pt;text-indent:0pt;color:rgb(0,61,165);outline:none"><span>UC-wide Mandate</span></h2></td></tr></tbody></table></td></tr><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><p dir="ltr" style="margin:0px 0pt;padding-bottom:0px;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span>All UC campuses are called to comply to help protect sensitive data, maintain operational continuity, comply with regulations, and mitigate financial risks associated with cyber attacks. </span></p></td></tr></tbody></table></td></tr><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="0px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><table role="button" width="100%" border="0" cellspacing="0" cellpadding="0" style="border-collapse:separate;table-layout:fixed;border-spacing:0px"><tbody><tr><td style="display:table-cell;text-align:center;overflow:hidden;line-height:36px;text-overflow:ellipsis;white-space:nowrap;background-color:rgb(255,184,28);color:rgb(28,28,28);border:1px solid rgb(255,184,28);height:27pt;font-size:12pt;font-family:Arial;font-weight:400;font-style:normal;padding-left:6px;padding-right:6px;width:100%;border-radius:4px;max-width:100%;vertical-align:middle"><a href="https://its.ucr.edu/uc-presidents-letter" style="width:100%;text-decoration:none;background-color:rgb(255,184,28);color:rgb(28,28,28);border-color:rgb(255,184,28)" target="_blank"><span style="overflow:hidden;text-overflow:ellipsis;white-space:nowrap;text-align:center;width:100%">Read the Letter</span></a></td></tr></tbody></table></td></tr></tbody></table></td></tr></tbody></table><table width="33.33333333333333%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><div id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.i9g978yl7hkd" style="margin-bottom:0px"></div><h2 id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.i9g978yl7hkd_l" dir="ltr" style="text-align:center;margin:0px 0pt;padding-top:0px;padding-bottom:0px;font-size:16pt;font-family:Arial;font-weight:700;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;padding-left:0pt;text-indent:0pt;color:rgb(0,61,165);outline:none"><span>Support</span></h2></td></tr></tbody></table></td></tr><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><ul style="list-style-type:square;margin:0px;padding:0px"><li dir="ltr" style="margin:0px 0px 0px 15pt;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;font-size:12pt;color:rgb(28,28,28);text-decoration:inherit;outline:none"><p dir="ltr" role="presentation" style="margin:0px 0pt;padding-left:0pt;text-indent:0pt;padding-bottom:0px;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;font-size:12pt;color:rgb(28,28,28);outline:none"><a href="https://its.ucr.edu/uc-security-toolset" style="color:inherit;text-decoration:none" target="_blank"><span style="text-decoration:underline;color:rgb(0,61,165)">Review the toolset information and guidance</span></a></p></li><li dir="ltr" style="margin:6px 0px 0px 15pt;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;font-size:12pt;color:rgb(28,28,28);text-decoration:inherit;outline:none"><p dir="ltr" role="presentation" style="margin:0px 0pt;padding-left:0pt;text-indent:0pt;padding-bottom:0px;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;font-size:12pt;color:rgb(28,28,28);outline:none"><a href="https://ucrsupport.service-now.com/ucr_portal?id=sc_cat_item&sys_id=d10c39ee0f348300138942bce1050e8b" style="color:inherit;text-decoration:none" target="_blank"><span style="text-decoration:underline;color:rgb(0,61,165)">Report an issue with installation</span></a></p></li><li dir="ltr" style="margin:6px 0px 0px 15pt;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;font-size:12pt;color:rgb(28,28,28);text-decoration:inherit;outline:none"><p dir="ltr" role="presentation" style="margin:0px 0pt;padding-left:0pt;text-indent:0pt;padding-bottom:0px;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;font-size:12pt;color:rgb(28,28,28);outline:none"><span>Get help in person by visiting an IT Support station in the libraries or SSC</span></p></li><li dir="ltr" style="margin:6px 0px 0px 15pt;padding-bottom:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;font-size:12pt;color:rgb(28,28,28);text-decoration:inherit;outline:none"><p dir="ltr" role="presentation" style="margin:0px 0pt;padding-left:0pt;text-indent:0pt;padding-bottom:0px;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;font-size:12pt;color:rgb(28,28,28);outline:none"><a href="https://events.ucr.edu/event/uc-cybersecurity-mandate-office-hours-with-its" style="color:inherit;text-decoration:none" target="_blank"><span style="text-decoration:underline;color:rgb(0,61,165)">Attend the next virtual office hour with ITS</span></a></p></li></ul></td></tr></tbody></table></td></tr></tbody></table></td><td style="min-width:12px"></td></tr></tbody></table></td></tr></tbody></table><table role="presentation" cellpadding="0" cellspacing="0" border="0" width="100%" style="background-color:rgb(255,255,255);background-size:cover;display:table;table-layout:fixed;width:100%;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%"><table width="100%" style="margin:auto;max-width:800px;min-width:320px;border-collapse:collapse;border-spacing:0px" align="center"><tbody><tr><td style="min-width:12px"></td><td width="100%" style="padding:9px 0px"><table width="100%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="0px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><table role="presentation" width="100%" cellspacing="0" cellpadding="0" border="0" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" height="40" style="height:40px"></td></tr></tbody></table></td></tr></tbody></table></td></tr><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><div id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.dewrrt9towbl" style="margin-bottom:0px"></div><h1 id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.dewrrt9towbl_l" dir="ltr" style="text-align:center;margin:0px 0pt;padding-top:0px;padding-bottom:0px;font-size:20pt;font-family:Arial;font-weight:700;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;padding-left:0pt;text-indent:0pt;color:rgb(0,61,165);outline:none"><span>Campus Compliance Report</span></h1></td></tr></tbody></table></td></tr></tbody></table></td><td style="min-width:12px"></td></tr></tbody></table></td></tr></tbody></table><table role="presentation" cellpadding="0" cellspacing="0" border="0" width="100%" style="background-color:rgb(255,255,255);background-size:cover;display:table;table-layout:fixed;width:100%;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%"><table width="100%" style="margin:auto;max-width:800px;min-width:320px;border-collapse:collapse;border-spacing:0px" align="center"><tbody><tr><td style="min-width:12px"></td><td width="100%" style="padding:9px 0px"><table width="100%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="0px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><div style="overflow:hidden"><img src="cid:ii_m9mzfq1w1" alt="image" style="height:auto;display:block;width:100%;border:0px" width="417" height="198"></div></td></tr></tbody></table></td></tr></tbody></table></td><td style="min-width:12px"></td></tr></tbody></table></td></tr></tbody></table><table role="presentation" cellpadding="0" cellspacing="0" border="0" width="100%" style="background-color:rgb(248,249,250);background-size:cover;display:table;table-layout:fixed;width:100%;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%"><table width="100%" style="margin:auto;max-width:800px;min-width:320px;border-collapse:collapse;border-spacing:0px" align="center"><tbody><tr><td style="min-width:12px"></td><td width="100%" style="padding:9px 0px"><table width="100%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><div id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.p4ecjw4rrqgv" style="margin-bottom:0px"></div><h1 id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.p4ecjw4rrqgv_l" dir="ltr" style="text-align:center;margin:0px 0pt;padding-top:0px;padding-bottom:0px;font-size:20pt;font-family:Arial;font-weight:700;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;padding-left:0pt;text-indent:0pt;color:rgb(0,61,165);outline:none"><span>What's at Risk If UCR Doesn't Comply by May 28, 2025?</span></h1></td></tr></tbody></table></td></tr><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><ul style="list-style-type:square;margin:0px;padding:0px"><li dir="ltr" style="margin:0px 0px 0px 15pt;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;font-size:12pt;color:rgb(28,28,28);text-decoration:inherit;outline:none"><p dir="ltr" role="presentation" style="margin:0px 0pt;padding-left:0pt;text-indent:0pt;padding-bottom:0px;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;font-size:12pt;color:rgb(28,28,28);outline:none"><span>Employees who have not taken the required steps to be compliant with training and device security will not be able to access secure UCR resources and applications, such as Canvas. </span></p></li><li dir="ltr" style="margin:6px 0px 0px 15pt;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;font-size:12pt;color:rgb(28,28,28);text-decoration:inherit;outline:none"><p dir="ltr" role="presentation" style="margin:0px 0pt;padding-left:0pt;text-indent:0pt;padding-bottom:0px;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;font-size:12pt;color:rgb(28,28,28);outline:none"><span>UCR will face </span><a href="https://its.ucr.edu/cybersecurity-mandate-2025#campus-consequences" style="color:inherit;text-decoration:none" target="_blank"><span style="text-decoration:underline;color:rgb(0,61,165)">costly financial penalties</span></a><span> and greater liability</span><span>, which may further impact budgets.</span></p></li><li dir="ltr" style="margin:6px 0px 0px 15pt;padding-bottom:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;font-size:12pt;color:rgb(28,28,28);text-decoration:inherit;outline:none"><p dir="ltr" role="presentation" style="margin:0px 0pt;padding-left:0pt;text-indent:0pt;padding-bottom:0px;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;font-size:12pt;color:rgb(28,28,28);outline:none"><span>Your personal information and university data will be at </span><a href="https://its.ucr.edu/cyber-attacks#higher-ed-cyberattack-news" style="color:inherit;text-decoration:none" target="_blank"><span style="text-decoration:underline;color:rgb(0,61,165)">greater risk of cyber attack or ransom</span></a><span>, which may result in research data loss, identity theft, prolonged disruption to university operations, and personal financial loss. </span></p></li></ul></td></tr></tbody></table></td></tr></tbody></table></td><td style="min-width:12px"></td></tr></tbody></table></td></tr></tbody></table><table role="presentation" cellpadding="0" cellspacing="0" border="0" width="100%" style="background-color:rgb(255,255,255);background-size:cover;display:table;table-layout:fixed;width:100%;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%"><table width="100%" style="margin:auto;max-width:800px;min-width:320px;border-collapse:collapse;border-spacing:0px" align="center"><tbody><tr><td style="min-width:12px"></td><td width="100%" style="padding:9px 0px"><table width="100%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><div id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.cylscum1pytx" style="margin-bottom:0px"></div><h1 id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.cylscum1pytx_l" dir="ltr" style="text-align:center;margin:0px 0pt;padding-top:0px;padding-bottom:0px;font-size:20pt;font-family:Arial;font-weight:700;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;padding-left:0pt;text-indent:0pt;color:rgb(0,61,165);outline:none"><span>Learn More</span></h1></td></tr></tbody></table></td></tr></tbody></table></td><td style="min-width:12px"></td></tr></tbody></table></td></tr></tbody></table><table role="presentation" cellpadding="0" cellspacing="0" border="0" width="100%" style="background-color:rgb(255,255,255);background-size:cover;display:table;table-layout:fixed;width:100%;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%"><table width="100%" style="margin:auto;max-width:800px;min-width:320px;border-collapse:collapse;border-spacing:0px" align="center"><tbody><tr><td style="min-width:12px"></td><td width="100%" style="padding:9px 0px"><table width="100%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><p dir="ltr" style="margin:0px 0pt;padding-bottom:0px;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span>The security toolset is required for any device that is used to connect to secure UCR networks and cloud resources, including personal devices. These devices include computers, laptops, and Microsoft Surface tablets (</span><a href="https://its.ucr.edu/uc-security-toolset#are-mobile-devices-included-in" style="color:inherit;text-decoration:none" target="_blank"><span style="text-decoration:underline;color:rgb(0,61,165)">learn what’s not included</span></a><span>).</span></p></td></tr></tbody></table></td></tr></tbody></table></td><td style="min-width:12px"></td></tr></tbody></table></td></tr></tbody></table><table role="presentation" cellpadding="0" cellspacing="0" border="0" width="100%" style="background-color:rgb(255,255,255);background-size:cover;display:table;table-layout:fixed;width:100%;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%"><table width="100%" style="margin:auto;max-width:800px;min-width:320px;border-collapse:collapse;border-spacing:0px" align="center"><tbody><tr><td style="min-width:12px"></td><td width="100%" style="padding:9px 0px"><table width="100%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="0px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><table role="presentation" width="100%" cellspacing="0" cellpadding="0" border="0" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" height="40" style="height:40px"></td></tr></tbody></table></td></tr></tbody></table></td></tr></tbody></table></td><td style="min-width:12px"></td></tr></tbody></table></td></tr></tbody></table><table role="presentation" cellpadding="0" cellspacing="0" border="0" width="100%" style="background-color:rgb(248,249,250);background-size:cover;display:table;table-layout:fixed;width:100%;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%"><table width="100%" style="margin:auto;max-width:800px;min-width:320px;border-collapse:collapse;border-spacing:0px" align="center"><tbody><tr><td style="min-width:12px"></td><td width="100%" style="padding:9px 0px"><table width="8.333333333333332%" style="vertical-align:top;border-collapse:collapse;border-spacing:0px"></table><table width="41.66666666666667%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="0px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><div style="overflow:hidden"><img src="cid:ii_m9mzfq1x2" alt="image" style="height:auto;display:block;width:100%;border:0px" width="163" height="114"></div></td></tr></tbody></table></td></tr></tbody></table><table width="41.66666666666667%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><div id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.g5cxhpceefwg" style="margin-bottom:0px"></div><h2 id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.g5cxhpceefwg_l" dir="ltr" style="margin:0px 0pt;padding-top:0px;padding-bottom:0px;font-size:16pt;font-family:Arial;font-weight:700;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;padding-left:0pt;text-indent:0pt;color:rgb(0,61,165);outline:none"><span style="font-variant:normal">Reason for Change: UC Cybersecurity Mandate 2025</span></h2></td></tr></tbody></table></td></tr><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><p dir="ltr" style="margin:0px 0pt;padding-bottom:0px;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span>These changes are part of UCR's plan to</span><span style="font-variant:normal"> better protect our community and comply with a new UC systemwide mandate.</span></p></td></tr></tbody></table></td></tr><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="0px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><table role="button" width="100%" border="0" cellspacing="0" cellpadding="0" style="border-collapse:separate;table-layout:fixed;border-spacing:0px"><tbody><tr><td style="display:table-cell;text-align:center;overflow:hidden;line-height:36px;background-color:rgb(255,184,28);color:rgb(28,28,28);border:1px solid rgb(255,184,28);text-overflow:ellipsis;white-space:nowrap;height:27pt;font-size:12pt;font-family:Arial;font-weight:400;font-style:normal;padding-left:6px;padding-right:6px;width:100%;border-radius:4px;max-width:100%;vertical-align:middle"><a href="https://its.ucr.edu/cybersecurity-mandate-2025" style="background-color:rgb(255,184,28);color:rgb(28,28,28);border-color:rgb(255,184,28);width:100%;text-decoration:none" target="_blank"><span style="overflow:hidden;text-overflow:ellipsis;white-space:nowrap;text-align:center;width:100%">Learn About the Mandate</span></a></td></tr></tbody></table></td></tr></tbody></table></td></tr></tbody></table><table width="8.333333333333332%" style="vertical-align:top;border-collapse:collapse;border-spacing:0px"></table></td><td style="min-width:12px"></td></tr></tbody></table></td></tr></tbody></table><table role="presentation" cellpadding="0" cellspacing="0" border="0" width="100%" style="background-color:rgb(248,249,250);background-size:cover;display:table;table-layout:fixed;width:100%;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%"><table width="100%" style="margin:auto;max-width:800px;min-width:320px;border-collapse:collapse;border-spacing:0px" align="center"><tbody><tr><td style="min-width:12px"></td><td width="100%" style="padding:9px 0px"><table width="8.333333333333332%" style="vertical-align:top;border-collapse:collapse;border-spacing:0px"></table><table width="41.66666666666667%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="0px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><div style="overflow:hidden"><img src="cid:ii_m9mzfq1y3" alt="image" style="height:auto;display:block;width:100%;border:0px" width="163" height="114"></div></td></tr></tbody></table></td></tr></tbody></table><table width="41.66666666666667%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><div id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.kpkq9i48l02o" style="margin-bottom:0px"></div><h2 id="m_6361788067395835073m_-7884991747303411855m_6072684117824426644gmail-h.kpkq9i48l02o_l" dir="ltr" style="margin:0px 0pt;padding-top:0px;padding-bottom:0px;font-size:16pt;font-family:Arial;font-weight:700;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;padding-left:0pt;text-indent:0pt;color:rgb(0,61,165);outline:none"><span style="font-variant:normal">Video: Message from the Provost </span></h2></td></tr></tbody></table></td></tr><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><p dir="ltr" style="margin:0px 0pt;padding-bottom:0px;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;text-align:left;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span style="font-variant:normal">Watch this video message from Provost Watkins to learn why UCR is strengthening MFA, along with other key steps we must take to keep our Highlander community safe.</span></p></td></tr></tbody></table></td></tr><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="0px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><table role="button" width="100%" border="0" cellspacing="0" cellpadding="0" style="border-collapse:separate;table-layout:fixed;border-spacing:0px"><tbody><tr><td style="display:table-cell;text-align:center;overflow:hidden;line-height:36px;background-color:rgb(255,184,28);color:rgb(28,28,28);border:1px solid rgb(255,184,28);text-overflow:ellipsis;white-space:nowrap;height:27pt;font-size:12pt;font-family:Arial;font-weight:400;font-style:normal;padding-left:6px;padding-right:6px;width:100%;border-radius:4px;max-width:100%;vertical-align:middle"><a href="https://www.youtube.com/watch?v=8-bMZddr-Bc" style="background-color:rgb(255,184,28);color:rgb(28,28,28);border-color:rgb(255,184,28);width:100%;text-decoration:none" target="_blank"><span style="overflow:hidden;text-overflow:ellipsis;white-space:nowrap;text-align:center;width:100%">Watch on YouTube</span></a></td></tr></tbody></table></td></tr></tbody></table></td></tr></tbody></table><table width="8.333333333333332%" style="vertical-align:top;border-collapse:collapse;border-spacing:0px"></table></td><td style="min-width:12px"></td></tr></tbody></table></td></tr></tbody></table><table role="presentation" cellpadding="0" cellspacing="0" border="0" width="100%" style="background-color:rgb(248,249,250);padding-bottom:0px;padding-top:0px;background-size:cover;display:table;table-layout:fixed;width:100%;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%"><table width="100%" style="margin:auto;max-width:800px;min-width:320px;border-collapse:collapse;border-spacing:0px" align="center"><tbody><tr><td style="min-width:12px"></td><td width="100%" style="padding:9px 0px"><table width="100%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="0px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><table width="100%" cellspacing="0" cellpadding="0" border="0" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="line-height:8.5px;font-size:8.5px"> </td></tr><tr><td width="100%" style="background-color:rgb(193,198,200);line-height:2px;font-size:2px"> </td></tr></tbody></table></td></tr></tbody></table></td></tr></tbody></table></td><td style="min-width:12px"></td></tr></tbody></table></td></tr></tbody></table><table role="presentation" cellpadding="0" cellspacing="0" border="0" width="100%" style="background-color:rgb(255,255,255);background-size:cover;display:table;table-layout:fixed;width:100%;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%"><table width="100%" style="margin:auto;max-width:800px;min-width:320px;border-collapse:collapse;border-spacing:0px" align="center"><tbody><tr><td style="min-width:12px"></td><td width="100%" style="padding:9px 0px"><table width="100%" style="vertical-align:top;display:inline-table;border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" style="padding-left:9px;padding-right:9px;display:table-cell"><table cellpadding="7px" width="100%" style="border-collapse:collapse;border-spacing:0px"><tbody><tr><td width="100%" align="center" style="word-break:break-word"><p dir="ltr" style="text-align:center;margin:0px 0pt 0pt;padding-top:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span style="font-variant:normal">Need IT help? Submit a support ticket at </span><a href="https://its.ucr.edu/help" style="color:inherit;text-decoration:none" target="_blank"><span style="font-variant:normal;text-decoration:underline;color:rgb(0,61,165)">its.ucr.edu/help</span></a></p><br><br><p dir="ltr" style="text-align:center;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;margin:6pt 0pt 0pt;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span>Information Technology Solutions</span></p><p dir="ltr" style="text-align:center;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;margin:6pt 0pt 0pt;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span>Computing & Communications Building</span></p><p dir="ltr" style="text-align:center;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;margin:6pt 0pt 0pt;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span>900 University Ave.</span></p><p dir="ltr" style="text-align:center;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;margin:6pt 0pt 0pt;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span>Riverside, CA 92521</span></p><p dir="ltr" style="text-align:center;margin:6pt 0pt 0px;padding-bottom:0px;font-family:Arial;font-weight:400;font-style:normal;font-variant:normal;vertical-align:baseline;text-decoration:none;display:block;line-height:1.2;padding-left:0pt;text-indent:0pt;font-size:12pt;color:rgb(28,28,28);outline:none"><span>951-827-4848 | </span><a href="https://its.ucr.edu/" style="color:inherit;text-decoration:none" target="_blank"><span style="text-decoration:underline;color:rgb(0,61,165)">its.ucr.edu</span></a><span> </span></p></td></tr></tbody></table></td></tr></tbody></table></td><td style="min-width:12px"></td></tr></tbody></table></td></tr></tbody></table></td></tr></tbody></table></td></tr></tbody></table></div></div></div></div>
_______________________________________________<br>
Faculty mailing list<br>
<a href="mailto:Faculty@scotmail.ucr.edu" target="_blank">Faculty@scotmail.ucr.edu</a><br>
<a href="https://scotmail.ucr.edu/mailman/listinfo/faculty" rel="noreferrer" target="_blank">https://scotmail.ucr.edu/mailman/listinfo/faculty</a><br>
</div></div></div>
</div></div>
</div>