University Policy 5.8
Authentication to Information Technology Resources
Cornell University owns and manages university electronic identifiers. In the course of its business and missions, it provides its community with access to information technology (IT) resources, such as email, internet, and network devices through these identifiers. To protect these resources from unauthorized use, Cornell requires IT users to obtain electronic identifiers (specifically, Cornell electronic identifiers, as defined herein) to gain access to these resources, and follow specific rules for their use, as well as obtaining, changing, and terminating these identifiers. In addition, to avoid unauthorized access to IT resources, holders of Cornell electronic identifiers must follow specific rules for creating and using, and for reporting the suspected compromise of, complex passwords that correspond to a Cornell electronic identifier.
Your college or unit’s administrative office.