Skip to main content

Guides

  • A Guide to Online and Blended Learning

    As you start to think about and develop your online or blended course, some of the material that you already use in classroom teaching may transition easily to an online learning environment, and some may need to be re-worked. A successful online or blended course can include creating new material and applying innovative teaching strategies. For an effective online learning experience, content should be presented in a way that can be viewed and digested in chunks with engaging enrichment... read more

  • Arranging Consultant Access to IT Services Checklist

    These instructions outline how to set up access for external consultants and vendors to Cornell University services. Many steps pertain to setting up a secure work environment. With the approval of Cornell's IT Security Office, vendors and consultants may substitute comparable local security practices. To obtain approval, the Cornell representative working with the vendor or consultant must contact security-services@cornell.edu. If you prefer, you can print the checklist and use it in... read more

  • CIT Operational Procedures for Commercial Applications

    Commercial Applications works with applications that contain confidential data. To reduce risk, Commercial Applications treats all data as confidential data. CIT Commercial Applications staff and all consultants who work with CIT Commercial Applications must abide by these additional security practices. 

  • CIT Operational Procedures for Information Security ("9 Points")

    Central IT Departmental Policy Statement The central IT organization (see organizational charts), comprised of CIT Enterprise Applications, CIT Infrastructure, Customer Service and Support, IT Administration, IT Communication and Documentation, the IT Security Office, the Office of the CIO, and the Project Management Office, has developed specific requirements for all personal productivity workstations (desktops and laptops). These requirements extend to any desktop or... read more

  • Copyright Infringement Risks

    Takedown or Digital Millennium Copyright Act (DMCA) notices are the most common type of copyright infringement notices that Cornell receives. Content owners such as Universal, HBO, Paramount, and the Recording Industry Association of America send these notices to the Internet Service Provider from which the file was made available (in our case, Cornell University). For full details about the DMCA, see Digital Millennium Copyright Act from the EDUCAUSE Library. The Higher Education... read more

  • Creating a Local Unit Data Cleanup Program

    This section outlines decisions unit leadership should make before starting to develop the actual unit cleanup process. For details about the cleanup process, see Data Cleanup Implementation. Key Decisions Appoint someone to assume overall operational leadership. Determine what role others in the unit will play. Develop local policy about retention of confidential data. Decide who is responsible for determining whether a given file with confidential data should be... read more

  • Filesharing Risks

    Important facts: It's illegal to distribute copyrighted content, even if you are using a premium fileshare application that you paid for, or copying music off of a CD you purchased. Students can incur network usage charges, by uploading or downloading more than the max GB threshold per month. Find out how many GBs are allowed at the Network Fees and Billing (NUBB) page. If your computer is connected to the Internet, filesharing applications continue uploading files to other... read more

  • IT Orientation

    Welcome to the IT@Cornell orientation guide for Cornell University. Whether you are a new or seasoned employee, or moving into a new position within IT@Cornell, these pages can help guide you through all the business processes, administrative functions, and resources available to IT employees at Cornell. We’re glad you are a part of Cornell University and IT@Cornell! Navigating through these orientation materials in order is highly suggested. The topics are organized into three themes... read more

  • Packaging Software for Casper Deployment (Endpoint Management Tools - Mac)

    This page is intended for IT support professionals. End users should contact local IT support. Packaging software for deployment consists of collecting source files, making any changes, and building them into a package. You add packages to your JSS instance, then deploy them via a Casper policy. Part One - Collect the Source Files Part Two - Edit a Package Source (optional) Part Three - Build the Package Using Source Files Notes on Packaging Software for Deployment

  • PeopleSoft Checklist

    These instructions outline how to set up access for external consultants and vendors to Cornell University's PeopleSoft service. Many steps pertain to setting up a secure work environment. With the approval of Cornell's IT Security Office, vendors and consultants may substitute comparable local security practices. To obtain approval, the Cornell representative working with the vendor or consultant must contact security-services@cornell.edu. If you prefer, you can print the checklist and... read more

Pages