University of Toronto Logo

Information + Technology Services

System Status
- A A A+
A-Z list of all Information Technology Services available at U of T.

Tools and resources supporting academic activities in the classroom and beyond.

Resources for access to systems, password resets, anti-virus, encryption and security.

Information on available administrative applications and available support.

Resources for applications development and enterprise service architecture model.

E-mail, video/audio conferencing and other communication tools available at U of T.

Resources + support for acquisition, maintenance + disposal of hardware + software.

HelpDesks, Training and Support resources for all central IT services at U of T.

Resources and support for networking, wireless and remote access at U of T.

All policies and guidelines concerning Information Technology at U of T.

PMO resources for assessment, planning, governance and implementation of IT projects.

STARREZ RESIDENCES (MYRES): This is the place to apply for on-campus housing -- Whether you are a first-year or returner, undergraduate or graduate, single or with a family, U of T St. George, Scarborough or Mississauga student.
  • Confirm interest in residence
  • Rank and save residence choices
  • Indicate special requests
  • Access supplementary applications
  • Check status of residence applications
SERVICES FOR: STUDENT FACULTY STAFF ALUMNI VISITOR
ENCRYPTION: The University of Toronto is committed to protecting its information resources and has issued a "Guideline regarding security for personal and other confidential information."  This guideline requires that personal and other confidential information in electronic form be protected by properly implemented encryption unless it is kept in a secure server environment with appropriately restricted users rights. 


SERVICES FOR: STUDENT FACULTY STAFF ALUMNI VISITOR
DESKTOP ENCRYPTION: In order to help departments comply with applicable privacy legislation, ITS offers the University of Toronto IT community recommendations and guidelines on how to configure full disk encryption. Full disk encryptions encrypt all of the data on the hard drive in a single, initial pass called 'conversion'. Once this conversion is complete, all subsequent encryption and decryption operations are transparent to the user. Full disk encryption is considered the best practice for maintaining the integrity of sensitive data-at-rest by protecting all of the data that is saved on the disk. This includes operating system files, temporary data, recycled files, paging and hibernation files, and the Windows registry.
SERVICES FOR: STUDENT FACULTY STAFF ALUMNI VISITOR
TECHSMITH RELAY: The Techsmith Relay software is a tool that records lecture audio and syncs it with the on-screen display of your computer or laptop.  It also offers simple editing tools that allow you to excerpt portions from the start or the end of the lecture. Techsmith Relay does not record classroom video or images from a document camera, and has a limited capacity for recording on-screen actions (for example, web searches, pointing and highlighting within presentation software slides, etc.). 

Techsmith Relay is formerly known as Camtasia Relay. 

SERVICES FOR: STUDENT FACULTY STAFF ALUMNI VISITOR

The Latest News

Loading featured news