Skip to main content

Network Service Terms and Conditions

Information about policies, device registration, billing for students, security, and data collection by Cornell. 

This article applies to: Wi-Fi, Wired Network: Faculty and Staff


Users of Cornell University’s IT resources are subject to local, state, and federal laws, as well as University IT policies. See Responsible Use of Electronic Communications for what this means for you.

Violations of policy may be prosecuted under the Campus Code of Conduct or the Code of Academic Integrity. The network is a Cornell University resource and Cornell IT may restrict any person's access to its resources without prior notice.


Users of the Cornell network are responsible for the security of their computer and other networkable devices. See Securing Your Computer from the IT Security Office.

The IT Security Office may monitor campus networks for systems showing signs of infection or compromise. Systems displaying serious vulnerabilities or problematic behavior may have their network access restricted or denied until the issue has been resolved.

Device Registration

University Policy 5.7 Network Registry requires that any computer or other networkable device connected to the Cornell network (wired or Wi-Fi) must be registered.


Activation and monthly fees apply for wired network connections in academic and administrative buildings. See Fees and Billing for more information.

Student Internet (wired and Wi-Fi) use at Cornell is subject to network usage-based billing (NUBB). Students who exceed the monthly billing threshold will be billed. Campus visitors, faculty, staff, and other non-students are not subject to billing.

Data Collection by Cornell

Cornell IT collects data about network usage for security, performance, troubleshooting, and billing. Data collection is in compliance with University Policy 5.1 Responsible Use of IT Resources.

Related Policies

See the University Policies site for details.

  • 5.0 Abuse of Computers and Network Systems
  • 5.1 Responsible Use of Electronic Communications
  • 5.10 Information Security
  • 5.4.1 Security of Information Technology Resources 
  • 5.4.2 Reporting Electronic Security Incidents
  • 5.7 Network Registry

Was this page helpful?

Your feedback helps improve the site.