Secure computing for the CCNY community requires that certain protocols and procedures be followed.
If you need a copy of a form please contact: IT Security
CCNY IT is steadily updating and adding information, posting guidelines and providing the means to achieve the goal of secure computing. Any office that will be using sensitive information from students, faculty or staff is required to fill out and file the appropriate form(s). All forms are to be submitted to and approved by the Office of the Chief Information Officer.
Please send completed forms to the Service Desk firstname.lastname@example.org and copy (CC) email@example.com . Please make sure that your form has all the necessary signatures before submitting.
|Request for Administrative privileges on modern desktop Operating Systems grant users complete control over most functions and features of the Operating System and Applications.|
|Request for permission to use and store information containing Social Security Numbers ("SSN") of CCNY-related individuals.|
|The request for City College employee email and/or computer is governed by part IV, section 1 of The City University of New York Policy on Acceptable Use of Computer Resources|
Firewall Exception Request Form (Login Required)
NEW - SUBMIT-ONLINE: The request for a network firewall exceptions or opening a port allow certain traffic to be sent to or from your computer through that firewall. >>View NEW FAQs and additional form details
|Request for access to Non-Public University Data by an individual who is not a regular CUNY employee. See Section 3 in Information Technology Security Procedures.|
|Request using this form is for Remote Access using a VPN (Virtual Private Networks) account or for access behind a network firewall.|
CUNY Information Security Review Questionnaire
(Word Download, size: 57kb)
|This questionnaire facilitates the identification of security requirements for CUNY information technology projects, applications or systems. The questionnaire is intended for those CUNY projects, applications and systems that involve Non-Public University Information or that acquire ongoing vendor IT services (e.g., application software hosting, hardware/software infrastructure, data storage facilities, staffing, etc.)|