Skip to main content

Managing Vendors and Consultants Articles

back
Show titles with any search term.
  • Security Procedures

    • Secure environment for administrative access Administrators of applications within the framework are required to use secure environments to carry out administrative operations and tasks....
    • Password storage is via a secure, two-factor password system. This allows for secure password storage while allowing authorized users to retain and share important system passwords.
    • These security procedures apply to Cornell University staff only. Scans for confidential data - Regular scans using Identity Finder should be made against all systems regardless...
    • These security procedures apply to both Cornell University staff and consultants serving CIT Commercial Applications. Also see: Operational Procedures for Confidential Data for Central IT...
    • This security procedure applies to vendors and consultants only. Vendors and consultants must adhere to security measures included in the terms of the contract.