Skip to main content

Security of Information Technology Resources

Cornell University expects all individuals using information technology devices connected to the Cornell network to take appropriate measures to manage the security of those devices. In addition, the university establishes roles and responsibilities surrounding the technical procedures required for the security of these devices.

Policy details


Your local college or unit administrative office.

Revision History:

December 13, 2017: Rewritten to conform to new IT governance structure, including introduction of ISPAC, renaming of job titles, and changing "DIRT" to "DPIRT"; to clarify roles and responsibilities; to specify "operating unit," as opposed to simply "unit."