Know What Information Is on Your Computer, and Secure It: Be aware of what types of information are stored on your computer and take steps to protect it.See An Overview of University Policies on Computer Security and Data Protection. This is established in numerous Cornell policies. Protecting University Data: You are responsible for Cornell data stored on computers you use.Please complete this by the end of February! Thank you!! J Please Remember: Once your computer has been scanned and you have worked through the results and removed any sensitive data, please see your local IT contact to sign off that your computer is clear of sensitive data. Also, please be sure to close out of all programs before running the Identity Finder scan!)
#Microsoft office 365 download cornell how to#
(I highly recommend reviewing this page and the how to videos on how to ignore or shred files before you begin. Please follow the instructions here on how to scan your computer: I would like each staff person to run the scan on their computer this month, and your local IT contact will have the sign-off sheet so we can record when the scan was last completed on your computer. All CCE-owned computers should already have this software installed, if your computer doesn’t or if you’ve forgotten your Identity Finder password, please see your local IT contact.ĬCE Administration recommends we do this scan at least twice per year, and quarterly for Finance and HR users. Identity Finder is the software program to use to help you locate confidential data on your machine. Time to scan your computer(s) for sensitive data to be in compliance with Cornell University policy (see snipets of Cornell security policy below with a link for more information).