-
Get started at Wharton with setup steps for Wi-Fi, email, software, apps, and tech tools.
-
Overview of how to print documents on the Wharton campus.
-
1. Introduction The Wharton Change Enablement Standard outlines the activities, decisions, and outputs required for submitting and approving changes to Information Technology (IT) systems and services within the Wharton...
-
1. Introduction The Wharton Data Retention Standard defines t he activities, responsibili ties , and r e quirements for retaining , storing, and disposing of institutional data across Wharton-managed systems and servi...
-
Last Updated: 05/18/2026
in Information Security
These information security policies, standards, and guidelines provide the minimum requirements for the Wharton community to: Enable the mission of the school.
Increase trust and reduce risk.
Address regulatory and legal requiremen...
-
1. Purpose and Scope This standard ensures that all individuals accessing Wharton systems and data understand their responsibilities for protecting information and technology assets. Awareness and Training supports a cultur...
-
There are many different ways to verify your identity using two-step verification - choose the one that's right for you! Your options may vary from service to service. Faculty, Staff, and PhD Students Contact your IT Support Representative ...
-
The following article will outline the process of setting up Two-Step Verification for a Google account. Two-Step Verification is required for all Google@Wharton accounts that do not use PennKey authentication, and is heavily recommended for perso...
-
This article is meant to provide guidance if you're unable to access your account because of Two-Step Verification. Your options may vary from service to service. Faculty, Staff, and PhD Students Contact your Wharton Computing Representative...
-
Two-Step Verification provides an added layer of protection for your online accounts. After you log in with your username and password, you'll be prompted to verify your identity – the second step – using a device in your possession, such as a mob...