Select Page

1.  Introduction and Approval of Minutes

At 2:01 P.M. Chuck Wigley welcomed the group and made introductions, asking everyone to say whether they had ever read a complete EULA (end user license agreement.)  Few people have had the stomach to even try.  A few had their students read and interpret selections.  Some, especially ITS personnel, have scanned EULAs to see how they affect the collect.  After introductions, Marianne Djuth moved to accept, various people seconded and the minutes were approved unanimously.   All ACAC minutes and related materials are available through

2.  Scheduling a special ACAC meeting

Dennis Mike, who couldn’t be present today, had sent an email to Chuck, which Chuck read aloud, mentioning a student who was hearing impaired and presented some challenges to Mike with regards to his design of an online course.  Mike wanted to have a discussion about students with special needs.  He recommended the basic principle of universal design which makes it much easier to design from the start than retrofit an existing course.

Though we had guests today dealing with this issue, there was a consensus that more needed to be said, perhaps in a special 2-hour discussion in the future.  No one objected.

3.  Students with Special Needs

Annie Dobies and Jennifer Herrmann from the Disability Support Services made a presentation about what the college is doing to accommodate students with different abilities and how we can adapt for different learners.  They showed a PowerPoint presentation, which is available on this website.

Dobies said online courses have changed how Disability Support Services works.  The goal is to provide equal access for all Canisius students with disabilities.  Her office deals with about 300 students.  DSS has to go with the student’s preference, not what we recommend, she said.  Marie said the trend is toward universal design which helps with compliance.

Deb Burhans asked how psychological problems fit into these services and Dobies responded that her office needs to work with these students individually, which takes a lot of time.  She said a list of  “students of concern” is sent to Public Safety.

Dobies said clickers used in some classes to elicit student responses do not meet ADA approval.  Also, Kindles (e-book readers) used in the classroom are not accessible.  The faculty should ask DSS about such technology issues before we make investments because there are some out there waiting for us to violate the law.

4.  Announcements

Estelle Siener reminded us that Digital Day is next week, Friday Feb. 11.  Events start at 11:30 AM and conclude at 4:30 with a keynote speaker, Joe Malley, in the Grupp Fireside Lounge of the Student Center.  There will be off-campus presenters, too, and about 80 attendees are signed up so far.  It will be big event, she said.  The web site is

Siener mentioned Outlook workshops which people can sign up for.  The announcement and more details are in Under the Dome:

She mentioned Kelly Showard’s new program Digital Mindquest, a brown bag lunch held once a month, starting Feb. 17.  Attendees are asked to read articles ahead of time.  The first one is about social media and its use in the classroom. More can be read about it here:

Marie Larcara announced a lunchtime laptop seminar about writing strategies and how to get students to produce quality writing, Feb. 2, 3 and 4.

Leah MacVie talked about online course development workshops.  More information at

Please see the listing of all Instructional Design Initiatives

5.   What should I do if I get a Virus?

Matt Gracie spoke and gave a PowerPoint presentation entitled “What Should you do when you get a virus?”  He talked about the latest trends in malware, such as the move away from viruses that exploit vulnerabilities and the shift to Trojan horses, something that tricks users.  OS firewalls are better than before so criminals are relying more on social engineering, and hence aren’t targeting the OS but application that runs on top, like Adobe reader, Java Virtual Machine, web browsers, etc.  Automatic update of these applications is not usually enabled, unlike automatic OS updates.

We need antivirus software everywhere because everyone is running Windows as Administrator, Gracie said.  Scott Clark can push out Mac antivirus if it is needed, though they are not running antivirus on Macs at the moment.

Gracie told us about the campus’s current choice of AV software, namely Microsoft Forefront, which had the best track record.  Matt showed us the interface to Forefront and elucidated some of its features.  Individuals can get a free similar product at home, namely Microsoft Security Essentials.  It has the same detection engine and is a free download.  The only difference is that Forefront can be customized for a business and provide updates differently.

One of the biggest threats today is Fake AV software, usually found through a social media website.  These sites trick users into click on something to further infect their computer.  Sometimes they are only strictly for making money and not about harming your computer.  Mark Meyer said he read 1 in 90 people seeing these popups will bite on the lure and send their credit cards.  Matt warned us if it doesn’t say Microsoft Forefront on it, then don’t do anything with it.

But some malware may set up a botnet and enable your computer to be hijacked by a remote operator.  This has become an extortion tool for criminals against small and medium sized businesses where security is minimal.  One such business was hit with a keystroke logger program embedded in a PDF file that was sent as a resume to a business recently.  Such a program could capture and transmit passwords to criminals.

Gracie was asked how we can tell if a random popup is from legitimate software or not.  He said you really can’t.  The best defense is not to get infected in the first place.

Melissa Menasco asked how she can get Forefont, since she still has ESET icon on her computer.  Gracie said there is an icon that will uninstall ESET and set up Forefront.  If that doesn’t work, call the ITS helpdesk at x2299.  She asked whether there is an automatic update to check for viruses when we login.  Siener said generally AV software runs in the background all the time, and scans only when a file moves in or out of your computer.  Usually you don’t need a full scan, but you can set a scheduled scan, she said.

Joel Cohen noted that the best defense is not your antivirus software but your behavior; you need to discipline yourself about what you click on.  Don’t click on attachments from unknown sources, he warned, and when you click on a hyperlink, make sure it is going to the right place.

6.  Adjournment

We adjourned at 3:00.

Respectfully submitted,
Mark Meyer