OIT Services

Services

Get Help

Need Assistance with a Service?

Normal Service Desk Hours
Monday - Friday | 8:00am to 6:00pm


Active Alerts


UCCS OIT Twitter Feed

Excelsior

Services

Excelsior

Excelsior, commonly referred to as the Z Drive, is a UCCS network drive that gives UCCS Students the ability to save files in one location and then access them from other locations. When logging into campus computers this drive is "mapped" to the computer automatically and is immediately available for use. Excelsior can also be accessed remotely using a VPN.

  • Who May Use This Service?

    Any active UCCS Student.

  • How Do I Change Or Stop This Service?

    Access ends when the student is no longer attending UCCS.

  • Data Policies

    APS 6005 IT Security Program - This policy details the entire IT Security Program, but under section 1 IT Resource User Responsibilities, "Establishes IT security requirements for all IT resource users in protecting University information and IT resources." 


    APS 2006 Retention of University Records - II.2. "University records shall be maintained in a medium owned or controlled by the University.  If the University does not offer a practical solution, (as determined by the campus information resource oversight authority) records may be maintained on outsourced IT services (such as web sites, web-based documents or social media sites), as long as departments seek approval from the campus IT security principal to ensure that vendor contracts and/or terms of service meet University standards."

     

    IT is aware that some employees have been using services that have not been approved to store University information.  Approved services have met certain guidelines to become approved such as testing, security practices, history of the service, terms of service, etc.  Unapproved services have not met or not yet met these guidelines.  If any unapproved services listed are below, the service may be putting University information at risk.  Any other services that are not listed on this page have not been fully reviewed and if you are using such a service, please contact IT Security for a review.