Skip to main content


Encryption is the process of scrambling data to make it unreadable to anyone who does not possess the proper key. When you encrypt an entire disk using FileVault, all of the files on the computer are encrypted, including:

Operating system files Application files Data files Swap files Free...Read more

BitLocker is a feature of Windows that encrypts your data to keep it safe from unauthorized access. Using BitLocker Whole Disk Encryption (WDE), your entire disk is encrypted.

Please consult your security liaison or your local technical support provider before enabling this feature on...Read more

Cornell's IT policies exist to maintain, secure, and ensure legal and appropriate use of the university's information technology infrastructure. Security and privacy policies work together to provide the campus community with a high quality, trusted, and secure campus computing environment....Read more

The Electronic Signature service, using Adobe Sign, gives you the ability to send documents and collect signatures electronically for approval. Adobe Sign works within your existing systems and processes, and the e-signatures are secure and legal. You can also digitize existing signing...Read more

With identity theft due to the loss of online data a major concern these days, Cornell needs to protect sensitive data stored in electronic form, particularly the personal information that students, employees, and others associated with the university have placed under our trust.

Why Data...Read more

Keeping your computer and devices secure and staying safe online may be easier than you think, and is worth the effort! By keeping your computer secure, you help safeguard all Cornell's systems, including our networks and other people's computers and devices, plus, you'll have the...Read more

Get Help for IT Security Problems

Your NetID , and other login information you use at Cornell, secures a host of services that are available to you as part of the university community. Following some straightforward practices and guidelines will keep your identity, computer, devices, and data...Read more