If you are an Extension faculty or staff member and you create events for groups to attend, you may find this of interest. Until last Spring, we offered you the use of “RegOnline” for registering and managing participants. Early this year, RegOnline was sold to another company and changes in their business model made it inappropriate for us. However, we now have an alternative available.
Iris Registration is web-based registration form building and management software that allows users to gather registrations and credit card payment for events. Iris Registration is also part of Seattle Technology Group's offerings, a company that specializes in software for Higher Education. With this new service you will be able to manage the most important aspects of your event including:
- Event form building
- Custom reporting and other participant information management
- Charges and issuing refunds as needed
Users of Iris will be asked to cover the associated costs of both the credit card & interchange fees, as well as a pre-registrant fee covering costs levied by Seattle Tech for using their service. For a more detailed explanation of costs please contact me (firstname.lastname@example.org).
Prior to making use of Iris Registration, you should familiarize yourself with the product. I will assist new users in putting together their first event registration. This will require setting up a meeting with me to discuss details of your event and beginning the process of building out your event form. An Iris account is required to log in to this web service, so to get started with Iris Registration, contact me (email@example.com).
Other IT News
With the recent uptick in phishing scams, we're reminding everyone to be mindful when opening your email. UMass IT maintains a helpful listing of the most recent UMass related phishing scams, and how to identify them as such. Go to Fresh Phishing Scams on Campus (www.umass.edu/it/freshphish). Also, UMass IT provides a Security Checklist for Personal Computers (www.umass.edu/it/support/security/security-checklist-personal-computers), an excellent resource for both home and work computers.