The policies published to this site are official policies sponsored by or endorsed by the Office of Information Technology. These policies have been adopted to help ensure the appropriate use of Princeton resources. Members of the University community are responsible for reviewing these policies and for complying with their requirements.
Access to Accounts
As reflected in Rights, Rules, Responsibilities 1.4.9 and 1.5.2, the University offers electronic services and the use of its electronic equipment and systems, including but not limited to servers, computers, mobile devices, telephone systems, and cloud-hosted storage (collectively, “IT Systems”), to students, faculty and staff for educational, research and administrative purposes in furtherance of its mission.
Data Center Policy
Princeton University maintains multiple data centers across the University campuses. The purpose of this policy document is to provide guidance for users and visitors to any of these University Data Centers. This policy is meant to not only ensure the safety and security of the users/visitors but also to protect and secure the University’s IT and other assets located within each of these data centers.
The Desktop Systems Council Committee oversees the use and maintenance of computers participating in the managed environments that make up the DeSC Program. The scope of the Council’s activities is to advise the university on standards for the managed computing platforms for institutionally owned computers. The DeSC Council also reviews security policies and practices for DeSC machines.
Information Security Policy
The purpose of this policy is to provide a security framework that will ensure the protection of University Information from unauthorized access, loss or damage while supporting the open, information-sharing needs of our academic culture. University Information may be verbal, digital, and/or hardcopy, individually-controlled or shared, stand-alone or networked, used for administration, research, teaching, or other purposes. Standards and procedures related to this Information Security Policy will be developed and published separately.
In order to manage the support of software that is made available through OIT, certain terms will apply to the availability of software. The terms call for all software to have an owner, and limit the number of versions that may be available to faculty, staff and students at any given time. The terms allow OIT to contain required support at a level that can be managed by retiring older or obsolete products.