Security of Information Technology Resources
Cornell University expects all individuals using information technology devices connected to the Cornell network to take appropriate measures to manage the security of those devices. In addition, the university establishes roles and responsibilities surrounding the technical procedures required for the security of these devices.
Your local college or unit administrative office.
December 13, 2017: Rewritten to conform to new IT governance structure, including introduction of ISPAC, renaming of job titles, and changing "DIRT" to "DPIRT"; to clarify roles and responsibilities; to specify "operating unit," as opposed to simply "unit."