Skip to main content

Arranging Consultant Access to IT Services Checklist

These instructions outline how to set up access for external consultants and vendors to Cornell University services. Many steps pertain to setting up a secure work environment. With the approval of Cornell's IT Security Office, vendors and consultants may substitute comparable local security practices. To obtain approval, the Cornell representative working with the vendor or consultant must contact

If you prefer, you can print the checklist and use it in conjunction with the detailed steps in this guide to track progress in arranging a consultant's access to Cornell's services.

Was this page helpful?

Your feedback helps improve the site.