Skip to main content

Policy Articles

back
Show titles with any search term.
  • Violations of Responsible Use of IT Resources (Policy 5.1)

    • Identifying the source The return address on an e-mail message may not be the real source of the e-mail. It's possible that a third party is trying to enlist your unknowing help in mail...
    • Any activity that is illegal under local, state, or federal laws is a violation of Cornell policy. Alleged violations will be referred to the campus Judicial Administrator. In addition, offenders...
    • Refer to Policy 6.4, Prohibited Discrimination, for obligations that apply in the Cornell employment setting. Unsolicited Email or Junk Email The amount of unwanted or unsolicited...
    • Office of IT Policy, contact through the IT Service Desk. Open to anyone, this office addresses electronic data, network and computing policies and coordinates communications among...
    • University-wide policies describe what activities constitute responsible use as well as violations. Following is more detail about some violations that IT@Cornell frequently gets questions...