We've received your request
You will be notified by email when the transcript and captions are available. The process may take up to 5 business days. Please contact email@example.com if you have any questions about this request.
The vast majority of computer breaches are the result of poor personal choices, weak computer practices, and less-than satisfactory data handling procedures.
Everyone has the responsibility to protect Cornell data on any computer used for Cornell work. Any data you access, which belongs to Cornell, has been placed in your care, whether it is data about other people, research, correspondence, or anything else.
In this video, learn what it means to practice good data hygiene and what the repercussions are if data is compromised.