Skip to main content

Cornell University

Faculty

Content (1172)

Password storage is via a secure, two-factor password system. This allows for secure password storage while allowing authorized users to retain and share important system passwords.
Secure environment for administrative access Administrators of applications within the framework are required to use secure environments to carry out administrative operations and tasks.
This security procedure applies to vendors and consultants only. Vendors and consultants must adhere to security measures included in the terms of the contract.
These security procedures apply to Cornell University staff only.
These security procedures apply to both Cornell University staff and consultants serving CIT Commercial Applications. Also see: Operational Procedures for Confidential Data for Central IT Employees.
Task responsibility Task details Consultant Agree to abide by Cornell's and Central IT policies and guidelines. Once you have a NetID, read the Annual Central IT Comprehensive Attestation and carefully review all the policy links.
E-lists (or mailing lists) are an important tool for keeping in touch with other technical support providers. They also offer a forum to discuss and get help with technical issues. To subscribe to an e-list, send the command join to listname-request@cornell.edu, where listname is the full name of…
CIT hosts more than 5500 different e-lists, serving more than 1,600,000 members. There are millions of lists hosted in other places. So how do you tell whether these web pages apply to the list you're interested in? A quick look at the email address of the list will tell you. CIT-hosted lists have…
To find out which CIT-hosted lists you have subscribed to, send an email message to lyris@cornell.edu   For the Subject of the message, type the single word which Leave the body of the message blank.  You must send this message from the email address where you receive e-…
Sending a message to the members of an e-list is almost exactly like sending any other email message. Put the e-list address in the To field. Be sure to include the hyphen and the letter L at the end of the list name. In this example, it's sheep-shearing-L  not sheep-shearing 
Replying to a list message is just like replying to any email message, except that you must be very careful to check where your reply will go. When list owners establish their lists, they decide where replies go. If the list has been set up for discussion, replies to messages will most likely…
For more information please see the following University Policy: Telephone Usage Policy
Notes for people who use a Cornell Optional Email Alias address instead of their NetID address. To leave an e-list (also called unsubscribing), send an email message to listname-request@cornell.edu 
To join an e-list (also called subscribing), send an email message to listname-request@cornell.edu  where listname is the name of the list you want to join, including the hyphen and the letter L at the end of the list name. For the Subject of your message, type the single word join Leave…
Most people come to this page when they tried to use the commands listed in our Customize Your List Settings article and got an error message that reads something like this: No password was specified after the email address (pw=password). You must specify your password before you can change your…
The options described here are explained in detail on our Customize Your List Settings (as a list member) article. This page describes a method for changing the settings on more than one list at a time.
What are my settings now? Looking for how to customize a list you administer?
How do I change my settings? To find out how you've got the options set for a particular list, send an email message to listname-request@cornell.edu
AList admins can review a list of members through the Lyris web interface.
Most email clients let you apply formatting to your messages, features like font choices, size, bold, colors, indents, etc. Some applications (for example, Lyris ListManager) expect commands sent via email to arrive in plain text. Formatted text is the most common cause of problems when…

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.