Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 4.0

...

Protecting University data:http://www.cit.cornell.edu/security/data/index.cfmImage Removed

Review Security of Electronic University Administrative Information: http://www.dfa.cornell.edu/dfa/cms/treasurer/policyoffice/policies/volumes/informationtech/upload/vol5_10.pdfImage Removed

Use of university owned computer equipment  - see: http://internal.cit.cornell.edu/Internal_Computer_Policies/Univ_Owned_Equip.htmlImage Removed

Voyeurism - refer to Data Stewareship & Custodianship Policy  -- http://www.dfa.cornell.edu/dfa/cms/treasurer/policyoffice/policies/volumes/governance/upload/vol4_12.pdf &nbspImage Removed; especially the section "General Prohibitions".   Note:  data modifications you do in non production environments to accomplish your job are fine.   Data modifications to production that are requested by the appropriate user office and tracked according to IS policies are fine.