Nominations for the 2016 Staff Recognition Awards are now open. These awards have been endowed through the generosity of Rudolf K. Haerle, Jr., Professor Emeritus of Sociology, who wished through his gift to recognize the importance of staff to the Middlebury Community.
Four awards are presented each year – one to a staff member in Dining Services, one to a staff member in Facilities Services, and two to staff members in all other areas of the Institution. Each winner will receive a cash prize of $200, and their names will be engraved on a plaque that hangs in the Grille.
Nominations for these awards may be submitted by completing the form attached to this link http://www.middlebury.edu/system/files/media/StaffRecognition2016.doc and sending it as a Word document to the Vice President for Finance and Treasurer mailbox at firstname.lastname@example.org, or mailing to Old Chapel 102.The deadline for nominations is Tuesday, May 10, 2016
The winners will be chosen by a selection committee consisting of the recipients of the 2015 awards: Joanne Leggett (Special Programs Coordinator -Admissions); Donna McDurfee (Administrative Coordinator of Faculty Affairs – Academic Affairs); Kevin Norton (Team Leader, General Services – Facilities Services); and Darren Zeno (Bread loaf Chef/Roundsperson – Dining Services).
Managers/Supervisors: Please post in a common area for those who do not have access to email.
The Program in Gender, Sexuality, and Feminist Studies and Chellis House, the Women’s Resource Center, are seeking nominations for the student, staff, and faculty Feminist of the Year.
As feminist, we define a person who actively engages with our community to dismantle social hierarchies and systems of oppression with a multi-layered understanding and appreciation of difference.
You may nominate persons in one or all of the following categories: student, staff, and faculty by Monday, May 9, 6 p.m. by sending an email to Karin Hanta by email: email@example.com or by campus mail.
I nominate __________________________ for student feminist of the year because
I nominate __________________________ for staff feminist of the year because
I nominate __________________________ for faculty feminist of the year because
Thank you for your nominations!
Please join us on Tuesday, May 10, 2016 in the Center for Teaching, Learning & Research at 12:15 pm.
As with all Academic Roundtables, lunch will be provided. RSVP to Doreen Bernier via email at firstname.lastname@example.org by noon on Friday, May 6, 2016.
The Academic Roundtable is co-sponsored by
the Center for Teaching, Learning, & Research and the Library
While our February Folio fever has passed, the Shakespeare celebration continues with the theater department’s upcoming production, A Midsummer Night’s Dream.
Come watch the latest show in the long legacy of Shakespeare at Middlebury with performances at 7:30pm Thursday-Saturday, May 5-7 and 2pm Sunday, May 8th in Wright Theater!
And be sure to catch Special Collections’ archival exhibit featuring historic costume and set designs of past Middlebury Shakespeare productions! On display for a limited time in the atrium of Davis Family Library.
You may not realize it, but you are a phishing target at school, at work, and at home. Phishing attacks are a type of computer attack that use malicious emails to trick targets into giving up sensitive information. Ultimately, you are the most effective way to detect and stop phishing scams. When viewing email messages, texts, or social media posts, use the following techniques to prevent your passwords, personal data, or private information from being stolen by a phishing attack.
- Verify the source. Check the sender’s email address to make sure it’s legitimate. Remember that the name of the sender is not the important part. The sender’s email address is what you are really looking for. If in doubt, forward your message to email@example.com.
- Read the entire message carefully. Phishing messages may include a formal salutation, overly-friendly tone, grammatical errors, urgent requests, or gimmicks that do not match the normal tone of the sender.
- Avoid clicking on erroneous links. Even if you know the sender, be cautious of links and attachments in messages. Don’t click on links that could direct you to a bad website. Hovering your mouse over a link should disclose the actual web address that the link is directing you too, which may be different from what is displayed in the message. Make sure this masked address is a site you want to visit.
- Verify the intent of all attachments with the sender before opening them. Even when you know a sender, you should never open an attachment unless have checked with the sender to verify the attachment was sent intentionally. Word and Excel documents can contain malicious macros which could harm your computer. Other files, such as zip files and PDF files, could download malware onto your system. Always verify the intent of attachments with the sender before you open them from an email.
- Verifying a message is always better than responding to a phish. If you ever receive a message that provides reason to pause, it is always better to forward the message to firstname.lastname@example.org or to send a separate email to the sender to verify its intent, before clicking a link or opening an attachment that could potentially impact the security of your computer..
- Change your passwords if you have fallen for a phish. If you think you have fallen for a phishing attack, change your password at go/password and then contact the helpdesk at x2200. It is also a good practice to change your personal passwords outside of the College.
Watch for phishing scams. Common phishing scams are published at sites such as http://IC3.gov , http://phishing.org ,https://www.irs.gov/uac/Report-Phishing. These resources will also allow you to report phishing attacks if you should fall victim outside of the College. Again, if you think you have fallen victim to a phishing attack, always start by changing your passwords.