Skip to content →

Frequently Asked Questions


RCAB General


What are brown bags?

A: Brown bags are series of meetings that the Research Computing Advisory Board (RCAB) puts on for faculty to attend. Each session will have a different topic of discussion related to RCAB.

How do I find more information on a particular committee and how can I get involved?

A: You can navigate to any of the subpages on this website to find information about each committee. If there is something that you can’t find or would like to get involved, you can fill out the form, here.

How do I get funding from the university to conduct research?

A: Any faculty member seeking institutional funding is encouraged to contact the Office of Research and Sponsored Programs. They are available to meet with faculty who are interested in starting a proposal for a grant. Even if the research idea is only in the concept phase, RSP staff are available to review the structure, format, and assist with making connections to institutional resources. 

They also can provide access to a service called Pivot-RP, that is a searchable database for funding opportunities and identifying potential research collaborators.

Contacts:


Cybersecurity


What if I think an email is fraudulent?

Phishing messages and scams can be reported to abuse@ilstu.edu or to supportcenter@ilstu.edu which is the Technology Support Center. The Tech Support Center can further assist by determining whether the email/message is legit or a fraud.

Any fraud crimes or severe cases will be handled by the Illinois State University Police.

What to do if you are afraid of being tricked into a scam?

Beginning last year, we developed and began offering remote work cybersecurity training for users working from home: Learn more here.

Beginning earlier this year, we now developed and now require cybersecurity awareness training for all students and employees: Learn more here. Other University affiliates can optionally take the training.

How is our information is kept safe?

To summarize, the University keeps information safe by having departments working together to make sure data is protected and users’ information is being protected. The information security and information risk management teams are involved.

It important that you know, that cyber criminals are after money and data. With their goal in mind, we implement confidentiality, integrity, and availability protections for the ISU systems and data we maintain. Further, we also have a thorough review process when contracting with third parties to ensure we meet data protection expectations.

What are the different privacy options?

Privacy options are limited for a few reasons. The University collects minimum data to complete the University’s mission, maintain systems, and provide services. Collecting more data than needed can increase the risk to the entity. Any data that is no longer needed is also deleted to minimize any risks. For more information check out: Privacy statement.


AR/VR


How do you reserve the XR facilities?

A: If you are interested in reserving the XR facilities, click here and complete the form. If accepted, the location of the XR facilities will be located in the DIGGS center.

Where is the DIGGS center located?

A: DIGGS is in Julian Hall, room 152A. For a map of Julian Hall, click here!

Skip to toolbar