Cornell University has policies and codes that define responsible use of computers and networks. There are also federal, state and local laws governing many interactions that occur on the Internet. You need to be aware of what your responsibilities are and what the process is for adjudicating violations. You also need to know what rights you have and how you can get help if your rights are violated.
See the university Policy on Responsible Use of Information Technology Resources
Sharing NetIDs and passwords (unauthorized use) | Chain e-mail and virus hoaxes | Harassment | Forgery | Tapping phone or network transmissions | E-mail bombing | Interfering with activities of others | Unauthorized access | Illegal activities
Unsolicited e-mail or junk e-mail | Breaches of network etiquette | Hate speech | Adult pornography
Refer to Policy 6.4, Prohibited Discrimination, for obligations that apply in the Cornell employment setting.
Copyright infringement | Software piracy | Sound recording piracy | Child pornography | Distribution of pornography to minors | Obscenity | Scams and pyramid schemes | Federal computer security violations | Bomb threats and hoaxes
Identifying the source | Finding header information | Deciphering headers | Who to report problem to? | Reporting to postmaster | Reporting to administrative contact | Reporting to outside agencies | Preparing the complaint or report
Office of the Judicial Administrator | Office of Information Technologies | Cornell Police | IT Service Desk | Office of the University Ombudsman | Workforce Policy and Labor Relations | Office of Human Relations | Judicial Codes Counselor