Updated Articles

  1. Whartonization Guide: Start Here

    Get started at Wharton with setup steps for Wi-Fi, email, software, apps, and tech tools.
  2. Printing at Wharton: Options, Locations, and Cost

    Overview of how to print documents on the Wharton campus.
  3. Change Enablement Standard

    1. Introduction   The Wharton Change Enablement Standard outlines the activities, decisions, and outputs  required  for  submitting and approving changes to Information Technology (IT) systems and services within the Wharton...
  4. Data Retention and Disposal Standard

    1. Introduction   The Wharton Data Retention Standard  defines t he activities, responsibili ties , and r e quirements for  retaining , storing, and disposing of institutional data across Wharton-managed systems and servi...
  5. Policies, Standards, and Guidelines

    These information security policies, standards, and guidelines provide the minimum requirements for the Wharton community to: Enable the mission of the school. Increase trust and reduce risk. Address regulatory and legal requiremen...
  6. Security Awareness and Training Standard

    1. Purpose and Scope   This standard ensures that all individuals accessing Wharton systems and data understand their responsibilities for protecting information and technology assets. Awareness and Training  supports a cultur...
  7. Two-Step: Methods of Verification

    There are many different ways to verify your identity using two-step verification - choose the one that's right for you! Your options may vary from service to service. Faculty, Staff, and PhD Students Contact your IT Support Representative ...
  8. Two-Step Verification (Google Accounts)

    The following article will outline the process of setting up Two-Step Verification for a Google account. Two-Step Verification is required for all Google@Wharton accounts that do not use PennKey authentication, and is heavily recommended for perso...
  9. Two-Step: Account Recovery

    This article is meant to provide guidance if you're unable to access your account because of Two-Step Verification. Your options may vary from service to service. Faculty, Staff, and PhD Students Contact your Wharton Computing Representative...
  10. Two-Step Verification: Start Here

    Two-Step Verification provides an added layer of protection for your online accounts. After you log in with your username and password, you'll be prompted to verify your identity – the second step – using a device in your possession, such as a mob...