How to get it
Employees should consult with their supervisor about technology needed for their work mode. The work mode selected will determine whether the employee will use a UD-managed device(s) or a personal device(s). After specifications have been reviewed, those employees working on UD-managed devices should complete the equipment purchase service request form.
How to manage it
Computers and information are always at risk. Following important best practices for computer and information security can help manage the risk to your devices and data. The practices linked below form the starting point for information security, but your unit may have specific or additional practices adapted to your needs. Always report any stolen devices immediately to the police and to secadmin@udel.edu.