Network Service Terms and Conditions
Information about policies, device registration, security, and data collection by Cornell.
This article applies to: Wi-Fi , Wired Network
Policies
Users of Cornell University’s IT resources are subject to local, state, and federal laws, as well as University IT policies. See Responsible Use of Information Technology Resources for what this means for you.
Violations of policy may be prosecuted under the Student Code of Conduct or the Code of Academic Integrity. The network is a Cornell University resource and Cornell IT may restrict any person's access to its resources without prior notice.
Security
Users of the Cornell network are responsible for the security of their computer and other networkable devices. See Secure Your Computer and Mobile Device from the IT Security Office.
The IT Security Office may monitor campus networks for systems showing signs of infection or compromise. Systems displaying serious vulnerabilities or problematic behavior may have their network access restricted or denied until the issue has been resolved.
Device Registration
University Policy 5.7 Network Registry requires that any computer or other networkable device connected to the Cornell network (wired or Wi-Fi) must be registered.
Data Collection by Cornell
Cornell IT collects data about network usage for security, performance, troubleshooting, and billing. Data collection is in compliance with University Policy 5.1 Responsible Use of IT Resources.
Related Policies
See the University Policies site for details.
- 5.0 Abuse of Computers and Network Systems
- 5.1 Responsible Use of Electronic Communications
- 5.10 Information Security
- 5.4.1 Security of Information Technology Resources
- 5.4.2 Reporting Electronic Security Incidents
- 5.7 Network Registry
Comments?
To share feedback about this page or request support, log in with your NetID