Guides
-
Arranging Consultant Access to IT Services Checklist
These instructions outline how to set up access for external consultants and vendors to Cornell University services. Many steps pertain to setting up a secure work environment. With the approval of Cornell's IT Security Office, vendors and consultants may substitute comparable local security practices. To obtain approval, the Cornell representative working with the vendor or consultant must contact security-services@cornell.edu. If you prefer, you can print the checklist and use it in... read more
-
CIT Operational Procedures for Commercial Applications
Commercial Applications works with applications that contain confidential data. To reduce risk, Commercial Applications treats all data as confidential data. CIT Commercial Applications staff and all consultants who work with CIT Commercial Applications must abide by these additional security practices.
-
CIT Operational Procedures for Information Security ("9 Points")
Central IT Departmental Policy Statement The central IT organization (see organizational charts), comprised of CIT Enterprise Services, CIT Infrastructure, Customer Experience, IT Administration, the IT Security Office, the Office of the CIO, and the Project Management Office, has specific requirements for all personal productivity endpoints (laptop, desktop, or virtual desktop). These requirements extend to any endpoint used to process or store university data. These... read more
-
Copyright Infringement Risks
Takedown or Digital Millennium Copyright Act (DMCA) notices are the most common type of copyright infringement notices that Cornell receives. Content owners such as Universal, HBO, Paramount, and the Recording Industry Association of America send these notices to the Internet Service Provider from which the file was made available (in our case, Cornell University). For full details about the DMCA, see Digital Millennium Copyright Act from the EDUCAUSE Library. The Higher Education... read more
-
Filesharing Risks
Important facts: It's illegal to distribute copyrighted content, even if you are using a premium fileshare application that you paid for, or copying music off of a CD you purchased. Students can incur network usage charges, by uploading or downloading more than the max GB threshold per month. Find out how many GBs are allowed at the Network Fees and Billing (NUBB) page. If your computer is connected to the Internet, filesharing applications continue uploading files to other... read more
-
IT Orientation
Welcome to the IT@Cornell orientation guide for Cornell University. Whether you are a new or seasoned employee, or moving into a new position within IT@Cornell, these pages can help guide you through all the business processes, administrative functions, and resources available to IT employees at Cornell. We’re glad you are a part of Cornell University and IT@Cornell! Navigating through these orientation materials in order is highly suggested. The topics are organized into three themes... read more
-
PeopleSoft Access Checklist
These instructions outline how to set up access for external consultants and vendors to Cornell University's PeopleSoft service. Many steps pertain to setting up a secure work environment. With the approval of Cornell's IT Security Office, vendors and consultants may substitute comparable local security practices. To obtain approval to non-standard but comparable security practices, the Cornell representative working with the vendor or consultant must contact security-services@cornell.edu... read more