Staff Computers
How to Get a Staff Computer
Review the list of preferred systems here. Work with your supervisor and the business office to fill out a Tech Form and submit to ITCS for the purchase.
Please double check that you are also getting a:
- Full size keyboard
- Mouse
- Monitor (if desired)
- Possible a Dock or a dongle to connect external devices – the recommended systems typically have very few ports.
- This is the one I usually recommend – works for both Mac and PC: Belkin USB C Hub, 5-in-1 MultiPort Docking Station – USB C Docking Station for iPad, iPad Pro, iPad Mini & MacBook – 1000W USB-C Power Delivery Gigabit Ethernet, USB-A 3.0, VGA, 4K HDMI & USB-C
- A laptop stand, to raise the screen to a better height ergonomically. They run about $25 on Amazon.
Mailing Lists
The Lawrence has two main mailing lists: lhsallstaff and lhslocalstaff. The second is for staff who come to the building and is used to share road closures and building construction.
Please contact Anna Maurer at annam@berkeley.edu to be added to either list.
Printers
The Department uses Ricoh MultiFunction Devices that print, scan, and copy. These devices require a printer code/job log code to print, and a separate scan code to scan to email. Each printer code is tied to particular group, project, or grant, so it is possible to use multiple codes.
The devices are locked to campus network ONLY, so you must be on Ethernet, Eduroam or the VPN to connect.
Whether you print from your computer, or from a Flash Drive, you will need a code. Codes are provided by the Business Office.
General Use
- Level B, Room 250 – Large Color Printer. Can print to Cardstock
- Level C, Room 121 – Smaller Black and White Printer
Special Use
- Level A, Visitor’s Services Desk – Color printer for VSD
- Level D, Room 5 – Black and White printer
To use the printers, you must have the proper Ricoh printer drivers (requires Admin Access to install). Connection is via IP, so please contact Anna Maurer at annam@berkeley.edu for assistance.
Available Software
The University of California, Berkeley provides a range of software for its community members, including Google Suite, LastPass Premium and Enterprise, Adobe Creative Cloud, Microsoft Office, and Tessitura, a Customer Relationship Management system.
View Available Software
Calendar
The Lawrence uses Google Calendar (a.k.a. bCal). Please keep your calendar up-to-date, including blocking off your working hours and out-of-office times as applicable.
Rooms are available to be booked via the Google Calendar -see instructions (forthcoming).
Security
(aka Anna’s Scary Speeches 1-3tm)
(1) All systems are registered to the Campus Security Office and associated with your Calnet ID. Campus security regularly scans the network and our computers. If they see that your computer is behaving badly, they will report this information to ITCS and us, that the computer registered to YOU and under your direct control is acting badly and must be dealt with. They do not see who is logged in (other staff member, etc), only that it is registered to YOU, and they will act under the assumption that you are currently using a computer that is acting badly, and ask us to respond.
(2) Protected Data (P) is classified based on the potential harm resulting from unauthorized access, disclosure, loss of privacy, compromised integrity, or violation of external obligations. The campus classification is here. It runs from P0 – lowest level, to P4 – highest level, also known as “lead story on the national news for weeks”. All UC Employees must take steps to make sure the data under their control is protected. For this Scary Speech, the data levels to be aware of are P3 and P4, as those are the ones with legal consequences. If you find yourself in possession of this data and you are not supposed to be, please let the Security Lead (currently, Anna Maurer, annam@berkeley.edu) know immediately.
(3) Personal computer use for work purposes is highly discouraged as it creates a liability for both the employee and the University. If your personal computer is damaged as a result of work activities, UC will not reimburse you. UC will not reimburse you if you buy a computer for work use outside of the approval and purchase process. If UC systems are damaged as a result of using a personal computer for work issues, there will likely be consequences.
- The latter scenario is possible. A security tool that campus promoted had a major breach that put all user passwords at risk. A developer for that company used their personal computer for work. A third party program they installed for personal use had a major security hole, allowing the bad actors to install a key logger. When the developer logged into work systems on that computers, the bad actors were able to capture the login information and use it to steal data.