Skip to main content

Security & Policy Articles

back
Show titles with any search term.
  • Working with High Risk Data

    • There are important updates to Policy 5.10 Information Security, that better align with our current technology and security environment. ​For more...
    • Cornell is like a small city. People work, study, live, and play here. We have our own transportation, dining, administration, residence halls, and offices. As a result, there is a wide variety of...
    • Data Disposal Old information is risky information! Watch out for and regularly dispose of unneeded information: Social Security numbers used as general identifiers (this was often...
    • Even if you don’t usually access high-risk data, you may have downloaded it at some point or it may have been sent to you. The only way to be sure your computer is free of high-...
    • When you work with printed material containing high-risk data, handle it responsibly: Secure documents, so they are only accessible to authorized personnel (lock them in a drawer,...
    • Not sure what high-risk data is? See Data types (High Risk, Moderate Risk, Low Risk). Options for Sharing High-Risk Data The Cornell Secure File Transfer service, ...