Managing Vendors and Consultants Articles back Search titles Show titles with any search term. See all topics Security Procedures Secure Environment Secure environment for administrative access Administrators of applications within the framework are required to use secure environments to carry out administrative operations and tasks.... Secure Password Storage Password storage is via a secure, two-factor password system. This allows for secure password storage while allowing authorized users to retain and share important system passwords. Security Procedures for Cornell Staff Only These security procedures apply to Cornell University staff only. Scans for confidential data - Regular scans using Identity Finder should be made against all systems regardless... Security Procedures for Staff and Consultants These security procedures apply to both Cornell University staff and consultants serving CIT Commercial Applications. Also see: Operational Procedures for Confidential Data for Central IT... Security Procedures for Vendors and Consultants Only This security procedure applies to vendors and consultants only. Vendors and consultants must adhere to security measures included in the terms of the contract.