Skip to main content

Cornell University

security

Content (4)

Best practices for everyone (students, faculty, and staff): Although these are requirements for employees handling sensitive information, it is also good practice to configure all devices in this way for extra protection against loss or theft. Definition of mobile handheld devices: …
Learn how to protect yourself online and help guide others in the right direction. Stay #CyberAware and #BeCyberSmart. Your digital footprint matters.
University-Owned Computers If the university-owned computer is managed by a unit that's signed a Certified Desktop agreement, your IT staff will deploy CrowdStrike.

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.