Normal Help Desk Hours
Monday - Friday | 8:00am to 6:00pm
UCCS OIT Twitter Feed
Excelsior, commonly referred to as the Z Drive, is a UCCS network drive that gives UCCS Students the ability to save files in one location and then access them from other locations. When logging into campus computers this drive is "mapped" to the computer automatically and is immediately available for use. Excelsior can also be accessed remotely using the Resources VPN. Setup information for the Resources VPN can be found in the Documentation section below.
Who May Use This Service?
Any active UCCS Student.
How Do I Change Or Stop This Service?
Access ends when the student is no longer attending UCCS.
APS 6005 IT Security Program - This policy details the entire IT Security Program, but under section 1 IT Resource User Responsibilities, "Establishes IT security requirements for all IT resource users in protecting University information and IT resources."
APS 2006 Retention of University Records - II.2. "University records shall be maintained in a medium owned or controlled by the University. If the University does not offer a practical solution, (as determined by the campus information resource oversight authority) records may be maintained on outsourced IT services (such as web sites, web-based documents or social media sites), as long as departments seek approval from the campus IT security principal to ensure that vendor contracts and/or terms of service meet University standards."
IT is aware that some employees have been using services that have not been approved to store University information. Approved services have met certain guidelines to become approved such as testing, security practices, history of the service, terms of service, etc. Unapproved services have not met or not yet met these guidelines. If any unapproved services listed are below, the service may be putting University information at risk. Any other services that are not listed on this page have not been fully reviewed and if you are using such a service, please contact IT Security for a review.