IT Policies

The policies published to this site are official policies sponsored by or endorsed by the Office of Information Technology. These policies have been adopted to help ensure the appropriate use of Princeton resources. Members of the University community are responsible for reviewing these policies and for complying with their requirements.

Access to Accounts

As reflected in Rights, Rules, Responsibilities 1.4.9 and 1.5.2, the University offers electronic services and the use of its electronic equipment and systems, including but not limited to servers, computers, mobile devices, telephone systems, and cloud-hosted services and storage (collectively, “IT Systems”) to students, faculty and staff for educational, research and administrative purposes in furtherance of its mission.

Computer and Endpoint Security Requirements

As part of a broader IT Strategic Plan, the University is taking purposeful steps to protect our campus IT infrastructure from ransomware and other destructive cybersecurity attacks.

Data Center Policy
Princeton University maintains multiple data centers across the University campuses. The purpose of this policy document is to provide guidance for users and visitors to any of these University Data Centers. This policy is meant to not only ensure the safety and security of the users/visitors but also to protect and secure the University’s IT and other assets located within each of these data centers.
Information Security Policy
The purpose of this policy is to provide a security framework that will ensure the protection of University Information from unauthorized access, loss or damage while supporting the open, information-sharing needs of our academic culture.  University Information may be verbal, digital, and/or hardcopy, individually-controlled or shared, stand-alone or networked, used for administration, research, teaching, or other purposes.  Standards and procedures related to this Information Security Policy will be developed and published separately.  
Software Retention
In order to manage the support of software that is made available through OIT, certain terms will apply to the availability of software. The terms call for all software to have an owner, and limit the number of versions that may be available to faculty, staff and students at any given time. The terms allow OIT to contain required support at a level that can be managed by retiring older or obsolete products.