Skip to main content

Cornell University

Network Service Terms and Conditions

Information about policies, device registration, security, and data collection by Cornell. 

This article applies to: Wi-Fi , Wired Network

On This Page

Policies

Users of Cornell University’s IT resources are subject to local, state, and federal laws, as well as University IT policies. See Responsible Use of Information Technology Resources for what this means for you.

Violations of policy may be prosecuted under the Student Code of Conduct or the Code of Academic Integrity. The network is a Cornell University resource and Cornell IT may restrict any person's access to its resources without prior notice.

Security

Users of the Cornell network are responsible for the security of their computer and other networkable devices. See Secure Your Computer and Mobile Device from the IT Security Office.

The IT Security Office may monitor campus networks for systems showing signs of infection or compromise. Systems displaying serious vulnerabilities or problematic behavior may have their network access restricted or denied until the issue has been resolved.

Device Registration

University Policy 5.7 Network Registry requires that any computer or other networkable device connected to the Cornell network (wired or Wi-Fi) must be registered.

Data Collection by Cornell

Cornell IT collects data about network usage for security, performance, troubleshooting, and billing. Data collection is in compliance with University Policy 5.1 Responsible Use of IT Resources.

Related Policies

See the University Policies site for details.

  • 5.0 Abuse of Computers and Network Systems
  • 5.1 Responsible Use of Electronic Communications
  • 5.10 Information Security
  • 5.4.1 Security of Information Technology Resources 
  • 5.4.2 Reporting Electronic Security Incidents
  • 5.7 Network Registry

Comments?

To share feedback about this page or request support, log in with your NetID

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.