Skip to main content

Security

Encryption is the process of scrambling data to make it unreadable to anyone who does not possess the proper key. When you encrypt an entire disk using FileVault, all of the files on the computer are encrypted, including:

Operating system files Application files Data files Swap files Free...Read more

BitLocker is a feature of Windows that encrypts your data to keep it safe from unauthorized access. Using BitLocker Whole Disk Encryption (WDE), your entire disk is encrypted.

Please consult your security liaison or your local technical support provider before enabling this feature on...Read more

Cornell's IT policies exist to maintain, secure, and ensure legal and appropriate use of the university's information technology infrastructure. Security and privacy policies work together to provide the campus community with a high quality, trusted, and secure campus computing environment....Read more

The Electronic Signature service, using Adobe Sign, gives you the ability to send documents and collect signatures electronically for approval. Adobe Sign works within your existing systems and processes, and the e-signatures are secure and legal. You can also digitize existing signing...Read more

This site offers background about the University Data Cleanup and Inventory Initiative, including guidance for developing a local unit program.

Overview

Explains the initiative and background of the motivation and approach to the issues surrounding confidential data cleanup on campus....Read more

With identity theft due to the loss of online data a major concern these days, Cornell needs to protect sensitive data stored in electronic form, particularly the personal information that students, employees, and others associated with the university have placed under our trust.

Why Data...Read more

Keeping your computer and devices secure and staying safe online may be easier than you think, and is worth the effort! By keeping your computer secure, you help safeguard all Cornell's systems, including our networks and other people's computers and devices, plus, you'll have the...Read more

Pages