IT Guides

Explore technology guides for onboarding, offboarding, and everything in between.
Have an idea for a technology guide? Tell us about it.

Orange dash

Learn how to get connected to campus wifi and explore options for residence halls, family student housing, and guests.

This guide will help you navigate what you need to know about technology as a new and continuing student at UCSC

This guide provides instructions for updating your name and other data at to what you wish to be used and displayed.

Orange dash

Virtual, physical, and cloud hosting options to meet your needs for hosting servers, data, and/or applications.

Flexible and secure ways to store data effectively for the individual and larger-scale needs.

Orange dash

Learn how to put accessibility standards and best practices into action to ensure our websites, documents, emails and more accessible to all, without barriers, and compliant with policy.

Learn about core digital accessibility concepts and your role in making all aspects of digital life at UC Santa Cruz accessible to people with disabilities.

Orange dash

Helpful tips for faculty and staff who are leaving or retiring from the UC Santa Cruz.

Tips for managers and supervisors of faculty and staff who are leaving or retiring from the university.

Orange dash

Laptop, computer, display, printer, and accessory options for faculty and staff.

How-to information on purchasing technology good and services on the Financial Affairs website.

Contact your department / unit / team CruzBuy requisitioner to help with purchasing technology.

Information about the current assessment, weightings, and background on the model.

Orange dash

Learn more about security requirements, your role, and best practices for staying safe.

Guidance specifically for students to stay safe, and avoid financial and other harms.

Verified Access is an enhanced security measure required to access certain UC Santa Cruz systems.

Framework for classifying assets into three key categories: Protection Level, Availability Level, and Recovery Level.

Ensures that all UC locations use the same methods to reduce and manage cyber risks, protect information, and keep IT resources running securely.

Establishes an IT recovery plan for UC locations to protect institutional information and IT resources in the event of an emergency.

Last modified: May 12, 2025