Skip to main content

Cornell University

data security

Content (11)

Whether it's a password for your computer, your NetID password used to access Cornell's online services, or those that secure other aspects of your digital life, it's essential that you make your passwords strong and never share them. All of your passwords, and especially your NetID password,…
Be sure to back up your data. Data stored on your devices can be lost, accidentally deleted, or maliciously attacked. Protect your important files, data, and research by making electronic copies and storing them safely. Have multiple backup plans in place to fully secure your work as appropriate…
This article provides information about using the Whiteboard feature in Zoom.
This information is intended for IT professionals. End users should contact local IT administrators with any questions or concerns about their Certified Desktop configuration. The following list of field definitions will be used for Certified Desktop compliance reporting.
This service is intended for IT support professionals.
Certified Desktop is licensed and deployed to campus units by IT support professionals. Individual users who are interested in installing the data security tools that are part of Certified Desktop on their Cornell-owned laptop or desktop computer should contact local IT administrators. CIT is…
Certified Desktop is intended to be licensed and deployed by IT support professionals. End users who are interested in obtaining the data security tools that are part of Certified Desktop should contact their local IT administrator. The Certified Desktop service term began July 1, 2018, for a…
Units agreeing to the terms of the Certified Desktop Memorandum of Understanding (MOU) will need to document a plan to implement effective data security technical measures.
For units who have signed up for Certified Desktop, the following alternative security tools may be considered acceptable for meeting compliance requirements. Units should consult with the IT Security Office on deployment and reporting considerations.  If the solution you're seeking is…
Using Cornell Secure File Transfer, you can securely send and receive files that contain confidential and restricted information. It is especially important that those who handle such files understand data security best practices. General Security Considerations The following are recommended…
How can Cornell help you protect your computer in the face of mounting online threats? With Certified Desktop, CIT works with your department’s IT staff to make your computer safer.

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.