Managing Vendors and Consultants Articles
-
Procedures for CIT
-
Task responsibility Task details Cornell University Send a request to remedy-...
-
Security administrators have created PeopleSoft Developer roles for each instance. In the dev instances, Cornell PeopleSoft developers have full access....
-
To safeguard confidential data and to ensure use of a common toolset, Cornell and contract staff must use a VM set up with tools such as Application Designer, SQL access software and...
-
Cornell's Virtual Private Network (VPN) provides secure, authenticated remote access to university networks and services. Cornell faculty, staff, students, affiliates, and consultants with valid...
-
SQL Developer permits developers to directly read a database. Task responsibility Task details...
-
A Cornell Network ID (or NetID) is a personal, unique identifier assigned to you. It consists of your initials followed by one or more numbers, for example, xxx99@cornell.edu. You use it,...
-
Task responsibility Task details Consultant You cannot use your NetID password...
-
CIT staff and consultants must use the RSA two-factor authentication and hopper servers when connecting to remote systems that have direct access to, or house, confidential data. This is...
-
Unanet is an online system for reporting time spent on CIT Information Systems projects. Task responsibility Task details...
-
CIT maintains and abides by a set of security requirements. Vendors and consultants are required to be aware of them and abide by them as well. Task responsibility...
-
One-time codes for two-factor authentication can be generated from hardware or software keyfobs. Step-by-step instructions for generating one-time codes are supplied here for iPhones and...
-
Task responsibility Task details Consultant Agree to abide by Cornell's and Central IT policies and guidelines. Once you have a...
Procedures for Other Cornell IT Organizations
-
Other Cornell IT organizations that leverage vendors and consultants are invited to include their onboarding procedures here. Contact it-communications@cornell.edu to make arrangements.
Security Procedures
-
Secure environment for administrative access Administrators of applications within the framework are required to use secure environments to carry out administrative operations and tasks....
-
Password storage is via a secure, two-factor password system. This allows for secure password storage while allowing authorized users to retain and share important system passwords.
-
These security procedures apply to Cornell University staff only. Scans for confidential data - Regular scans using Identity Finder should be made against all systems regardless...
-
These security procedures apply to both Cornell University staff and consultants serving CIT Commercial Applications. Also see: Operational Procedures for Confidential Data for Central IT...
-
This security procedure applies to vendors and consultants only. Vendors and consultants must adhere to security measures included in the terms of the contract.
-