Information Technology Services: Policies, Guidelines, and Forms

Account Management Policy

View Policy »

Your New York Tech account provides you with access to the institution's technological resources.

Administrative Rights Policy [Requires Login]

View Policy »

This policy applies to all faculty/staff members who require Privileged and/or Administrative Rights on NYIT-owned desktops, laptops, and other end-user devices that connect to the NYIT network.

Code of Responsible Technology Usage

View Policy »

This policy sets forth standards for responsible and acceptable use of New York Tech's Information Technology Systems (ITS) resources.

Clean Desk and Clear Screen Policy

View Policy »

This policy is designed to establish a culture of data security and trust for all members of the New York Tech community, greatly enhancing the protection of paper and electronic records that contain Confidential and Restricted Data.

Computer and Printer Deployment Policy

View Policy »

All New York Tech provided desktops, laptops, tablets, printers, etc., in all campuses and locations, including the networked multifunction devices, are subject to this policy.

Data Security and Access Management Policy

View Policy »

New York Tech's employees with access to confidential or restricted data are responsible for ensuring compliance with this Data Security and Access Management Policy.

Electronic Signature Policy [Requires Login]

View Policy »

New York Tech encourages the use of electronic signatures, transactions, and electronic records as long as their use meets NYIT's legal and security requirements outlined in this policy.

Learning Management System (LMS) Policy

View Policy »

This policy ensures the integrity of the data contained within the official university-supported Learning Management System (LMS), currently Canvas, and compliance with the requirements of related New York Tech policies as well as state, federal, and accreditation agencies.

Mobile Device Policy

View Policy »

This policy applies to all New York Tech employees, consultants, contractors, and other affiliated individuals who are assigned a university-owned, procured, or provisioned cellular network mobile device for business purposes.

New Computer Request [Requires Login]

View Policy »

New York Tech will provide an appropriate computer for personnel who need one to perform their duties under these guidelines.

New York Tech Information Security Policy and Incident Response Procedures

View Policy »

These procedures apply to all information, information systems, networks, applications, locations and users of New York Institute of Technology Data or information systems or supplied under contract.

Record Retention and Destruction Policy [Requires Login]

View Policy »

This policy sets forth principles and procedures that ensure faculty, staff and affiliates at New York Tech properly manage and protect the records it needs to retain, while properly disposing of records that are no longer legally or operationally required.

Remote Work Equipment, Resources, and Technology Guidelines

View Policy »

This policy applies to New York Tech's remote work equipment and resources and provides technical guidelines.

Password Management Policy [Requires Login]

View Policy »

The purpose of this policy is to establish the minimum standards for creation of strong passwords, the protection of those passwords, and the frequency of change.

User Access Rules [Requires Login]

View Policy »

The rules govern the access and use of New York Tech's computing system, hardware, software data, and any other information obtained from the institution's technological resources.

Verification of Student Identity for Online/Distance Learning

View Policy »

This policy applies to all domestic (U.S.-based) students in all credit-bearing, online/distance education courses offered by the New York Institute of Technology.

Vulnerability and Patch Management Policy

View Policy »

The purpose of this policy is to address how New York Tech assesses and manages technical vulnerabilities to university-owned or managed IT Resources.