Skip to main content

Cornell University

Content (1289)

Web browsers are often used for day-to-day work and study. As web browsers have grown increasingly complex, featureful, and essential to many tasks, they have become one of the most common avenues for bad actors to compromise your security. Follow these guidelines to enhance your web browser…
For information on how to teach remotely, visit the Center for Teaching Innovation's Introduction to Online Teaching Tools. See what tools can help you work remotely.
Keeping Your Devices SafeNever leave anything unattended in a public area, in a shared living space, or visible for potential intruders. Use physical locking devices or take them with you.Use an inconspicuous protective bag or case to carry your laptop and other devices.
Whether it's a password for your computer, your NetID password used to access Cornell's online services, or those that secure other aspects of your digital life, it's essential that you make your passwords strong and never share them. All of your passwords, and especially your NetID password,…
Best practices for everyone (students, faculty, and staff): Although these are requirements for employees handling sensitive information, it is also good practice to configure all devices in this way for extra protection against loss or theft.Definition of mobile handheld devices: …
Protect your NetID and password. At universities across the country, the theft of electronic IDs is a rapidly growing problem. Your NetID is your online identity at Cornell Used with your NetID password, it provides access to your personal information and is the key to using a variety of campus…
If your NetID password is stolen and your NetID is used to send email spam, there can be a number of warning signs:
Cornell is phasing out the use of security questions in favor of setting a recovery email address to reset forgotten or lost Cornell NetID passwords. Please visit Set a NetID Recovery Email for more details.If you:
1. Report the incident to the IT Security Office. Don’t hesitate. Any possible or confirmed theft of a NetID password needs to be reported immediately to the IT Security Office via security-services@cornell.edu. You should also notify your department’s technical support staff.
Keeping your personal information, Cornell sign-in credentials, and important data safe means protecting your passwords. Anyone with active online accounts encounters dozens of passwords used to access Cornell resources, personal online banking, e-commerce sites, and other websites. Below you will…
You are tricked into giving away your NetID password These days we are overwhelmed by fraudulent email messages and websites that try to steal personal information. These are often referred to as “phishes.” A common trick is to suggest that one of your accounts will be shut down unless you reply…
About Changing Your NetID Password When changing your NetID password, keep in mind:
The standard confidential data scan scenario is one person scanning one computer that contains one hard disk. In that case, the search and remediation process is straightforward, with few challenges or pitfalls. Unfortunately, the majority of computing environments on campus do not fit that…
Some jobs are far more likely to access and store confidential data than others. Knowing which ones can help you prioritize data cleanup.Important: Regardless of their role, people who have ever done any of the following probably have confidential data on their computer.
Whenever possible, we recommend not storing confidential data on your computer. If you have a need to store confidential information on your computer temporarily, consult with your technical support team. You must:
Not sure what high-risk data is? See Data types (High Risk, Moderate Risk, Low Risk).
In certain settings, e-mail software can store some or all electronic mail in files on your computer. This speeds access to e-mail, reduces the workload on mail servers, and allows you limited work even if you don’t have a network connection. Saved electronic mail also presents some unique…
After running a data discovery tool such as Identity Finder, the next step in the data discovery and clean up process is to decide how to handle each positive hit. Following is an explanation of common scenarios and the remediation options available in Identity Finder to handle each one.
If you haven't already reported the incident, do so now.
Whenever possible, we recommend using Cornell's FREE R5 service to safely destroy media.

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.