Our annual performance appraisals are coming up. This is a great opportunity to discuss goals, expectations, and performance standards. Remember performance appraisals is a collaborative process that involves the employee and supervisor.
- Attend upcoming training (optional)
- Complete your self-review
- Meet with your supervisor to discuss your appraisal
- Start planning for 2018
Remember, the Office of Human Resources (HR) offers tools and training to maximize the effectiveness of these performance appraisals…
OTIS has designed a new interim timesheet (Employee Timesheet System) to replace our current (also interim) SharePoint solution. SharePoint could no longer handle the year end influx of timesheets and we want to avoid problems we’ve experienced over the past two years. The end goal is still to utilize self-service timesheets in PeopleSoft so we will have another upcoming transition though not currently scheduled.
In preparation for the rollout, please ensure you’re up-to-date with submissions. Also, please scroll through your timesheets to ensure none are in a form state requiring…
A photo from the 11th floor. A Huddle Room is on the left. The white band is a markable wall surface.
WOW! So much is going…
Though tax-related scams are particularly prevalent in the U.S. at this time of the year, identity theft protection is important year round. The following video and infographic provides tips that all users can benefit from, including how to spot and avoid phishing emails, smishing (SMS/text phishing) scams, vishing (voice phishing) phone calls, and fake letters that claim to be from the Internal Revenue Service (IRS), tax filing services, and other tax-related agencies.
Avoid Tax-Related Scams Video: https://youtu.be/1KsizC-zbOM…
UT System Administration Employees;
IRS Form 1095-C will be printed and mailed to current and former employees, retirees and other covered individuals by March 2, 2017. You are not required to wait for Form 1095-C before filing your personal income tax return.
What is Form 1095-C?
This form provides information about the university’s health insurance offer and months of coverage for employees, retirees, and other covered individuals. The Affordable Care Act (ACA) requires most individuals to have qualifying health coverage, also referred to as minimum essential…
Join us for the first webinar of the Discover Break series. Hosted by OSI, the Discover Break series gives you an opportunity to discover and enhance your skills, knowledge, thinking, and learning abilities through informative sessions and webinars.
Discovery Break Webinar
When: Thursday, March 9, 2:00 p.m. - 3:00 p.m.
Topic: Using State Workforce Data to Examine Postgraduation Outcomes
Hosts: Dr. David Troutman & Jessica Shedd
The Employee Service Awards Program is scheduled to take place on Friday, February 10, 2017 from 2-4pm in the Intercontinental Stephen F. Austin Hotel Ballroom. Refreshments will be served following the ceremony.
Since the employee parking in our 3 garages are at capacity, paid parking will be provided for those that are receiving a Service Award on Friday at the One American Center parking garage (a map is attached). If you are located in Austin at LCRA, Moody Bank or the OFPC Comal office, please get a validation sticker from the registration desk…
A lot has happened since the last update!
The lights on the 11th floor have been powered up and ceiling tile is being installed, the glass in the office fronts are being installed on the 2nd floor, conditioned air is…
There are a couple of CPR/AED Classes coming soon:
- Adult, Child, & Infant CPR/AED
- Tuesday, February 28, 2017
- Tuesday, February 28, 2017
Please sign up at: https://apps.utsystem.edu/ORMTraining/TrainList.aspx
Beginning Monday, January 9th, the UT System Learning Zone will have a new look and feel. Powered by Skillsoft, the Learning Zone provides high-quality, innovative, cloud-based learning and performance support resources. The new and improved Learning Zone features a fresh, contemporary design, with the same great access to your eLearning courses, books, videos and more.
A few of the enhanced…
Take a moment to review these tips for creating strong passwords, and consider strengthening some of your passwords if they fall short.
-Do create unique passwords that use a combination of words, numbers, symbols, and both upper- and lower-case letters.
-Don’t choose passwords based upon details that may not be as confidential as you’d expect, such as your birth date, your Social Security or phone number, or names of family members.
-Don’t use words that can be found in the dictionary. Password-cracking tools freely available online often come with dictionary lists…
Monday, Jan. 2, 2017, is a banking holiday observed by the Federal Reserve and most financial institutions.
According to state law, Jan. 2 is considered the first working day following the December 2016 pay period, making it pay day for full-time employees paid on a monthly basis.
As a result, payroll paychecks (paper checks and direct deposits) will be dated Jan. 2, 2017. While direct deposit payments will be transmitted to financial institutions before and with the payment date of Jan. 2, those institutions are not required to post payments on the…
Q: Could we have a place with a salad bar/potato bar/bar in the building?
Phishing campaigns that try to dupe consumers into giving away personal and financial information tend to rise during the holiday season, use the following tips to prevent falling victim to cyber criminals.
If an offer looks too good to be true, it probably is.
A common tactic by cyber criminals is using extremely low prices on popular items, such as electronics, to lure in potential victims.
Use a credit card instead of a debit card.
If your credit card data is used for something nefarious, it’s easier to resolve issues with a credit card company than with your…
Each new data breach and phishing scam alert is accompanied by a wave of cyber security articles and commentary. The tone of these stories can range from panicked to apathetic. But the facts can't be ignored: identity theft is an epidemic in the United States. According to TransUnion, 19 people fall victim to identity theft every minute.
We can't prevent hackers from attacking technology, but we can arm ourselves with knowledge and habits to help keep our personal information safe from criminals. Let's get the facts straight. Here are the top ten myths about identity theft and, more…
On September 2, 2016, the Chancellor shared with System Administration that the Board of Regents approved the FY 2017 UT System operating budget with instructions to reduce the number of full-time equivalent (FTE) employees by at least 130 positions. In the same communication, System Administration was invited to submit questions regarding the process to OESQuestions@utsystem.edu . Questions have been submitted and the website created. The website will continue to be updated as additional questions are submitted and answers…
“The Cloud” can mean different things to different people, but usually means using a service provider on the Internet to store and manage your computing systems and/or data for you. An advantage of the Cloud is that you can easily access and synchronize your data from multiple devices anywhere in the world, and you can also share your information with anyone you want. We call these services “The Cloud” because you often do not know where your data is physically stored. Examples of Cloud computing include creating documents on Google Docs, sharing files via Dropbox, setting up your own…
As technology gains a more important role in our lives, it also grows in complexity. Given how quickly technology changes, keeping up with security advice can be confusing. It seems like there is always new guidance on what you should or should not be doing. However, while the details of how to stay secure may change over time, there are fundamental things you can always do to protect yourself. Regardless of what technology you are using, or where you are using it, we recommend the following four key steps:
Recognize that you are a target to cyber criminals. And keep in mind…
During the data collection phase of the organizational assessment, we learned requests for data and information to UT System institutions from UT System Administration are a significant burden. Reducing and streamlining those requests would be an important action to take.
In order to take that action, UT System Administration has created an online process. All requests for data and information must be sent through this online process. Following the submission of the request, the Office of Strategic Initiatives will respond within 5 days to determine whether the…
Welcome to Week 2 National Cyber Security Awareness Month! The second of our weekly cyber security topics is “Creating a Culture of Cybersecurity in the Workplace.”
The Internet has become an indispensable tool assisting in so many ways, from reaching new customers to enabling the mobile workforce to do its job. But being constantly connected increases the risk of online theft, fraud and abuse.
Protect Your Workspace
The Symantec 2016 Internet Security Threat Report revealed that in 2015, there was a record-setting total of nine mega-breaches, and the reported number…