Project Management

Mission Statement The Rutgers Office of Information Technology (OIT) Project Management Office (PMO) provides an enterprise wide service for management of IT initiatives in support of the Rutgers community. The PMO’s primary goal is to ensure that individual projects are delivered on time and within budget, and to ensure that […]

How to get to the Mandatory Compliance Training?

Please see the following instructions: (1) In myRutgers, please click on “My Apps” tab and then click on “Mandatory Compliance Training” icon/link. (As shown circled) (2) You should be able to single sign on to HealthStream which host the Compliance training including “Corporate Compliance”, “HIPAA Compliance” and “Rutgers Code of […]

How to print W2 from IE (Internet Explorer)

Here are the steps to print W2 from IE: 1)      Go to the printable w2-form, right click the context menu, click “Select All” 2)      Right click context menu on the selected area, click “Print Preview”.  On the top of preview screen, select “As selected on screen” 3)      Click Print and […]

RBHS portal migration

Dear Members of the RBHS Community: We are pleased to announce as part of the ongoing initiative to continue integrating legacy RBHS and Rutgers University systems, on March 14th, 2016, the legacy RBHS portal (myportal.rutgers.edu) will be migrated and merged into the new version of the University’s myRutgers portal (my.rutgers.edu). […]

(Group Studio) Sakai resources

You are encouraged to start using Sakai after the migration date to get better familiarized with its functionality. There is information for Sakai training available at https://oirt.rutgers.edu/instruc/train/ and for general Help with Sakai at http://rci.rutgers.edu/~oirt/sakai/helpdocs2  

Information Security Learning Series

New Hire Learning Series Policy Learning Series Courses in Development New Hire Learning Series The following materials have been developed to assist new hires with an overview of the services offered by the Information Security Office, as well as present basic security concepts, and underscore expectations for users of the […]