Secure Computing
Secure computing for the CCNY community requires that certain protocols and procedures be followed.
If you need a copy of a form please contact:
itsecurity@ccny.cuny.edu
CCNY IT is steadily updating and adding information, posting guidelines and providing the means to achieve the goal of secure computing. Any office that will be using sensitive information from students, faculty or staff is required to fill out and file the appropriate form(s). All forms are to be submitted to and approved by the Office of the Chief Information Officer.
Please send completed forms to the
servicedesk@ccny.cuny.edu
and copy
itsecurity@ccny.cuny.edu
. Please make sure that your form has all the necessary signatures before submitting the form.
Forms
Request for Administrative privileges on modern desktop Operating Systems grant users complete control over most functions and features of the Operating System and Applications. |
|
Authorization to Use and Store Non-Public University Information |
Request for permission to use and store information containing Social Security Numbers ("SSN") of CCNY-related individuals. |
The request for City College employee email and/or computer is governed by part IV, section 1 of The City University of New York Policy on Acceptable Use of Computer Resources |
|
Firewall Exception Request Form (Login Required) |
SUBMIT-ONLINE: The request for a network firewall exception or opening a port allows certain traffic to be sent to or from your computer through that firewall. >>View NEW FAQs and additional form details |
Request for access to Non-Public University Data by an individual who is not a regular CUNY employee. See Section 3 in Information Technology Security Procedures. |
|
VPN Access Request Form |
SUBMIT-ONLINE: Request using this form is for Remote Access using a VPN (Virtual Private Networks) account or for access behind a network firewall. >>View NEW FAQs and additional form details |
CUNY Information Security Review Questionnaire (Word Download, size: 57kb) |
This questionnaire facilitates the identification of security requirements for CUNY information technology projects, applications or systems. The questionnaire is intended for those CUNY projects, applications and systems that involve Non-Public University Information or that acquire ongoing vendor IT services (e.g., application software hosting, hardware/software infrastructure, data storage facilities, staffing, etc.) |
Last Updated: 02/27/2023 10:54