The browser you are using is out of date and may not support all of the features of this website. Please update your browser to a modern browser that supports HTML5.
Instructional Technology will provide technical support to Faculty and Staff members who wish to use GeorgiaVIEW (Brightspace by D2L) LMS.
Each semester GeorgiaVIEW will automatically create a section for every instructor who is teaching a course. This is true for in-class and on-line courses. This will make it possible for instructors who are not teaching on-line courses to use GeorgiaView as a supplement to their traditional classes.
It is the faculty members’ responsibility to set up and maintain their courses. This includes but is not limited to: putting up course content, creating quizzes, assignments, and posting other instructional material. Instructional Technology will work with faculty members to ensure that they have the ability to perform these duties. Instructional Technology will also provide one-on-one training as needed.
Instructional Technology offers workshops on GeorgiaVIEW every semester. These workshops cover the various tools available to help organize and manage a GeorgiaVIEW course, including content transfer, quiz management, posting course materials, managing students and use of the grade book. Participants are welcome to bring any items they need incorporated into their courses.
Support for GeorgiaView is available on a 24x7 basis via the D2L Help Center. This link is available on the GeorgiaVIEW Help page. This Center is designed to answer all of the questions regarding GeorgiaVIEW from a Designer, Instructor, or Student perspective. This service can be accessed anytime, from anywhere. The Help Center also has an extensive knowledge base that offers information and solutions for commonly asked questions or frequent problems encountered by GeorgiaVIEW users.
The GSW GeorgiaVIEW webpage has a number of resources available for faculty and students including:
Instructional Technology offers technical support by phone and email and will work with faculty members to resolve any problems they encounter with GeorgiaVIEW. The contact information is as follows:
Contact: Alla Yemelyanov
Phone: 229-931-2969 or 229-931-2074
The following list of software is approved, supported, and provided by IIT.
There are other software packages for which licenses may be purchased. These are not provided by IIT. This list includes, but is not limited to, Word Perfect, Adobe Acrobat, SPSS, and SAS.
GSW VPN (Virtual Private Network) access accounts may be obtained by employees and contractors of GSW by filling out and submitting the Georgia Southwestern State University Virtual Private Network (VPN) Usage Standard. Once the completed form is received it is subject to approval by the IIT Director or his/her designee.
Upon approval a VPN account will be created for the requesting person. The requesting person will then be notified that the account has been created and given connection instructions and login credentials. The login credentials will not be sent via e-mail or other electronic messaging. Employees of GSW will be instructed to use their active directory credentials, whose life-cycles are governed by GSW’s Password Security Standard, which meets or exceeds the Board of Regents Information Technology Handbook, Section 5.8 Password Security Standard. Persons not employed directly by GSW will be given login credentials verbally, in person or via telephone call.
VPN accounts are subject to suspension or termination if at any time it is discovered that the account is being used in a manner which violates the Virtual Private Network (VPN) Usage Policy.
VPN accounts are suspended or terminated under the following conditions:
Full support includes the amenities of basic support along with repairing equipment, with assistance from vendors if necessary, and ordering new parts when needed.
Basic Support includes reinstalling the newest version of the operating system and installing approved software for the applicable operating system.
Limited Support (Nonstandard Equipment):
Limited Support includes attempting installation of approved software and troubleshooting network connectivity.
If the computer cannot be serviced it will be returned to the business owner. This includes hardware and software problems (Including Malware, Spyware, and Viruses).
In the event that a non-standard computer needs to repaired by a third party vendor, the business owner is responsible for all communication with the vendor (such as obtaining RMAs),as well as packing and shipping. The business owner is responsible for all costs incurred for repairs.
Standard Hardware - Full Support:
Dell Optiplex 755, 760, 780, 790, 990, 7010, 9010, 3020, 7020, 9020, 3040 desktops
Dell Latitude D630, E6400, E6410, E6420, E6500, E6510, E6520, E6530, E6540 Laptops
Dell Latitude ST Tablet (This product has been discontinued as of 2014)
Dell Vostro 3750 Laptop
Standard Hardware - Basic Support:
Apple MacBook and MacBook Pro laptops
Apple iMac Intel Duo Core, PowerMac Desktops
Nonstandard Hardware - Limited Support:
All other equipment not listed above is nonstandard equipment with limited support by IIT.
Purchases made with university funds are to have a minimum 3-year warranty.
Hardware support for printers is limited to toner cartridge replacement and removal of paper jams. We do not replace printer parts.
Multifunction and Network Printers:
IIT is to be notified at least two business days prior to the installation of a multifunction or network printer.
Network Services is to be notified at the time IIT is notified in order to provide an IP address for the printer.
The installation of the device and any required software will be the responsibility of the vendor’s technician.
The IP address is to be statically assigned to the printer by the vendor’s technician.
The vendor’s technician may not disable any security programs/features existing on GSW computers including firewalls, antivirus software, intrusion prevention software, or other endpoint security measures during the installation process.
In order to comply with State of Georgia policy, the internal hard drive of a printer must be maintained by GSW after the expiration of the lease, or at the end of life of the device.
PDAs, Smartphones and handheld computers:
PDA, smartphones, and handheld computers are nonstandard equipment. They therefore fall under limited support.
The purpose of this policy is to provide guidelines for remote access to the Georgia Southwestern State University (GSW) campus network and its resources via Virtual Private Network (VPN) connections.
This policy applies to all GSW employees, contractors, consultants, temporaries, and other
workers including all personnel affiliated with third parties utilizing VPNs to access the GSW network. This policy applies to implementations of VPN that are directed through a VPN concentrator.
1. Approved GSW employees and authorized third parties (customers, vendors, etc.) may utilize the benefits of VPNs, which are a "user managed" service. This means that the user is responsible for selecting an Internet Service Provider (ISP), coordinating installation, installing any required software, and paying associated fees. The GSW IIT (Information and Instructional Technologies) department is not responsible for VPN connection problems resulting from technical difficulties on the part of the user's ISP of choice.
2. It is the responsibility of employees with VPN privileges to ensure that unauthorized users are not allowed access to GSW's internal networks.
3. VPN use is to be controlled using either a one-time password authentication such as a token device or a public/private key system with a strong passphrase.
4. When actively connected to the corporate network, VPNs will force all traffic to and from the PC over the VPN tunnel: all other traffic will be dropped.
5. Dual (split) tunneling is NOT permitted; only one network connection is allowed.
6. VPN gateways will be set up and managed by GSW's IIT department.
7. By using VPN technology with personal equipment, users must understand that their machines are a de facto extension of GSW's network, and as such are subject to the same rules and regulations that apply to GSW-owned equipment, i.e., their machines must be configured to comply with GSW's Information Security's Security Policies.
8. Users of computers that are not GSW owned equipment must configure the equipment to comply with GSW's VPN policy and Computer and Network Usage Policy.
9. All computers connected to GSW's internal networks via VPN or any other technology must up-to-date anti-virus software that has been approved by the Information and Instructional Technology (IIT) department. This includes personal computers.
10. Pings or other artificial network processes are not to be used.
11. Only IIT/Information Security-approved VPN clients may be used. VPN users will need to contact the IIT department to obtain the VPN client software.
Any authorized VPN account users found to have violated this policy will be subject to immediate suspension of remote access/VPN privileges, and disciplinary other actions.
VPN Concentrator : A device in which VPN connections are terminated.
6.0 Revision History
Revision 3 February 16, 2015