Arranging Consultant Access to IT Services Checklist
These instructions outline how to set up access for external consultants and vendors to Cornell University services. Many steps pertain to setting up a secure work environment. With the approval of Cornell's IT Security Office, vendors and consultants may substitute comparable local security practices. To obtain approval, the Cornell representative working with the vendor or consultant must contact email@example.com.
If you prefer, you can print the checklist and use it in conjunction with the detailed steps in this guide to track progress in arranging a consultant's access to Cornell's services.