The policies published to this site are official policies sponsored by or endorsed by the Office of Information Technology. These policies have been adopted to help ensure the appropriate use of Princeton resources. Members of the University community are responsible for reviewing these policies and for complying with their requirements.
As reflected in Rights, Rules, Responsibilities 1.4.9 and 1.5.2, the University offers electronic services and the use of its electronic equipment and systems, including but not limited to servers, computers, mobile devices, telephone systems, and cloud-hosted services and storage (collectively, “IT Systems”) to students, faculty and staff for educational, research and administrative purposes in furtherance of its mission.
As part of a broader IT Strategic Plan, the University is taking purposeful steps to protect our campus IT infrastructure from ransomware and other destructive cybersecurity attacks.1. Policy Statement
All computers and other endpoints that connect to Princeton’s secure network must comply with the…