Main navigation

News

  • Email Management: How to Use Retention Tags 

    As Ohio State works to decrease its email storage footprint, OTDI is publishing a series of articles that will help you take steps to reduce the number of emails you are storing. The first articles covered simple ways to clear emails that do not need to be saved and how to reduce storage in your account using your online email archive. This article explains how to use retention tags and policies ...
  • Updates to Cash Advances for Human Subjects, Petty Cash, and Change Funds 

    An updated job aid for "Cash Advances for Human Subjects, Petty Cash, and Change Funds" will be posted to the Administrative Resource Center (ARC) on Monday, December 11. The job aid has been enhanced and describes how to request petty cash/change funds while also outlining the related accounting impacts. New spend and revenue categories have also been created to support this process. T...
  • December Finance and Supply Chain Report Updates and Changes

    Spend Exceptions Dashboard Decommissioning:The dashboard "Spend Report Exceptions" will be decommissioned on Friday, December 29. End users should utilize the new "Exceptions Dashboard" for viewing policy exceptions for requisitions, expense reports, and supplier invoice requests. A report group could also be scheduled for viewing exceptions. To run the report group, use the Schedule a Report tas...
  • Changes to Buckeye Buy Catalogs 

    During the week of December 11, enhancements will be made to select Buckeye Buy items that will allow the commodity code to automatically populate on purchase requisitions. During the transition, requests to add or update affected items will be held until maintenance is complete. The estimated maintenance complete date is Friday, December 15. For UNIV purchases only - If the c...
  • Don't Let Phishing Spoil Your Day

    In today's digital world, phishing scams are a constantly growing threat to individuals and organizations like Ohio State. These deceptive schemes often involve malicious actors crafting emails or text messages that mimic legitimate communications from reputable sources, like banks, credit card companies, or even the university, to steal information. Phishing scams can also lead victims to downlo...

News Archive