Central IT Departmental Policy Statement The central IT organization (see organizational charts), comprised of CIT Enterprise Services, CIT Infrastructure, Customer Experience, IT…
Biometric authentication is used in the computer world as a form of identification and access control. You may be familiar with it through fingerprint login or facial recognition like Touch ID…
Since 2022 LastPass has not supported the Microsoft Edge Legacy browser extension for LastPass. This action follows an announcement from Microsoft that the Edge Legacy desktop application will…
File Size Restrictions The default file size restriction for attachments is 4 MB. Email attachments adhere to this size limit. The following have file size restrictions greater than …
As the project moves forward, the executive committee welcomes feedback as well as volunteers. If you are interested in participating on any of the task forces, contact Sarah Christen. Hardware…
Takedown or Digital Millennium Copyright Act (DMCA) notices are the most common type of copyright infringement notices that Cornell receives. Content owners such as Universal, HBO, Paramount, and the…
See Microsoft’s What Version of Outlook Do I Have support page.
Icon Used for - Bookmark Get started, link to page - Briefcase - Chat Bubble…
When sensitive data isn't managed appropriately, it poses many risks to Cornell. By law, possible loss to certain types of data requires Cornell to report to government agencies and notify…
Standard Features Hold To place a call on hold Press the Hold button. To return to held call Press Held Call Appearance. Call…
The links to most documents on this page are password-protected. If you think you should have access, contact cit-av@cornell.edu.Cornell's audio-visual standards are a set of documents,…