IT Resources

Accounts & Tools

PennKey & Two-Step Verification

PennKey & Two-Step Verification

Protecting Your PennKey

It is essential that you keep your password secure to prevent others from accessing your personal information.

Never share your PennKey password. Your data and the systems you access could be compromised due to their neglect or intent though you are still responsible for anything done in your name.

Don’t auto-save your password on programs or websites. Anyone else who uses your computer could then access your information.

Don’t use the same password for public websites (e.g., online bookstores, airlines, etc.) that you use with your PennKey. Rather, choose two passwords: your public password for use at public web sites and your private password for sensitive Penn systems.

Two-Step Verification

Email & Office 365

Email & Office 365

Update Sender Name

  1. Select “My Profile” in the top righthand corner;
  2. Log in with your PennKey username and password;
  3. Add a new entry with your name listed as desired; and
  4. Select the radio button (on left) to make it your primary listing.

Please note that O365 always displays names in the following order: Surname, GivenName MiddleName.

Additional Penn O365 Resources

Classroom & Meeting Technologies

Classroom & Meeting Technologies

Microsoft Teams

Canvas

Panopto

Surveys & Forms

Surveys & Forms

Qualtrics

Qualtrics is an online service for creating and administering surveys. SP2 has a site license, which covers SP2 faculty, staff, and students, including non-SP2 students enrolled in SP2 courses.

Qualtrics Help

Microsoft Forms

Poll Everywhere

File Sharing & Collaboration

File Sharing & Collaboration

Microsoft OneDrive

Microsoft SharePoint

Penn+Box

Secure Share

AI & Software PACKAGES

AI & Software Packages

AI Tools

Zoom AI Companion is now approved for use at SP2. Please review Penn’s guidance on this AI tool and AI tools in general.

Library Proxy

The Office of Software Licensing manages software site license programs and volume discounts at Penn for popular academic computing products.

Supported Computing Products

Policies & GUidelines

Computing Policies & Guidelines

NPL Program Technical Requirements Policy

Technical Requirements

The MS NPL program is designed for participation from either a desktop or laptop computer (PC or Mac) with a stable internet connection and a camera. Content is also accessible on a mobile device, though we do not recommend mobile devices as a primary method of access. A headset with microphone is recommended, especially for students enrolled in online classes. 

You will need to ensure that your computer meets the technical requirements for the following systems: 

  • Canvas (learning management system) 
  • Panopto (video hosting platform) 
  • Zoom (virtual meeting platform) 
  • Microsoft Office 365 (suite of tools including Outlook, Word, Excel, PowerPoint, etc.) 

For further guidance, read the SP2 IT Resources page, especially the For Students section

Learning from outside the United States

Some technologies used in online courses may be unavailable outside the United States. While use of a Virtual Private Network (VPN) can remediate this issue in some cases, students are advised to consult local laws and regulations before connecting to a VPN as they are illegal in some locations. For more information, please consult CETLI’s International Availability of Web Tools

Information Security: Best Practices for Data Security on Foreign Travel

Before you go

  • Do not take any sensitive data with you. If it is absolutely necessary, please contact SP2 Information Services so we can coordinate laptop encryption.
  • Do not take any sensitive or important information on external thumb drives, hard drives, etc. unless those devices are encrypted. (NOTE: Encryption technology is subject to export controls. Users intending to travel to Cuba, Libya, North Korea, Syria, Sudan, Iran or Iraq should contact Penn’s Office of Research Service for assistance in determining whether an export license is required.)
  • Ensure that your device is patched/updated.
  • All laptops, phones, tablets must have a password/PIN to access the device.
  • If you do have data stored on the laptop, ensure that a full backup has been made. Contact SP2 Information Services if you have questions.
  • Be sensitive to local privacy laws. Contact the Office of Audit, Compliance and Privacy for advice regarding the applicability of international privacy regulations.

While you’re away

  • Select WIFI connections that encrypt traffic, are restricted with a password and are provided by a trusted source (University, colleague, hotel, etc.) whenever possible. Use encrypted services whenever in doubt (e.g., HTTPS over HTTP) when web-browsing.
  • Avoid accessing sensitive websites from public computers, such as at Internet cafés, as their security is highly unreliable.
  • Keep mobile devices on your person or in a locked safe whenever possible. If your device is stolen, notify SP2 Information Services immediately or call ISC Information Security at 215-898-2172. See Data Security on Foreign Travel.

When you return

  • Perform an antivirus and malware scan on your laptop. Please contact SP2 Information Services for assistance with this.
  • Schedule a reimage (operating system/software reinstallation) if the device is having issues or as a precautionary measure.

For More Assistance Regarding Traveling Abroad

Penn Global Support Services

Penn Global Support Services: http://global.upenn.edu/gss

Penn Global Support Services, technology: https://global.upenn.edu/travel-guidance/technology

ISC Information Security

https://www.isc.upenn.edu/security/info