Information Technology Services: Policies, Guidelines, and Forms

Acceptable Use Policy (formerly know as Code of Responsible Technology Usage)

View Policy »

Access to and the use of New York Tech computer/technology resources and data come with specific expectations and user responsibilities.

Account Management Policy

View Policy »

Your New York Tech account provides you with access to the institution's technological resources.

Administrative Rights Policy [Requires Login]

View Policy »

This policy applies to all faculty/staff members who require Privileged and/or Administrative Rights on NYIT-owned desktops, laptops, and other end-user devices that connect to the NYIT network.

Clean Desk and Clear Screen Policy

View Policy »

This policy is designed to establish a culture of data security and trust for all members of the New York Tech community, greatly enhancing the protection of paper and electronic records that contain Confidential and Restricted Data.

Computer and Printer Deployment Policy

View Policy »

All New York Tech provided desktops, laptops, tablets, printers, etc., in all campuses and locations, including the networked multifunction devices, are subject to this policy.

Data Security and Access Management Policy

View Policy »

New York Tech's employees with access to confidential or restricted data are responsible for ensuring compliance with this Data Security and Access Management Policy.

Electronic Signature Policy [Requires Login]

View Policy »

New York Tech encourages the use of electronic signatures, transactions, and electronic records as long as their use meets NYIT's legal and security requirements outlined in this policy.

Employee Guidelines for Use of Generative AI/LLM Models

View Policy »

New York Tech supports the responsible use of generative AI tools, but there are important considerations to keep in mind when using these tools, including information security and data privacy.

Learning Management System (LMS) Policy

View Policy »

This policy ensures the integrity of the data contained within the official university-supported Learning Management System (LMS), currently Canvas, and compliance with the requirements of related New York Tech policies as well as state, federal, and accreditation agencies.

Mobile Device Policy

View Policy »

This policy applies to all New York Tech employees, consultants, contractors, and other affiliated individuals who are assigned a university-owned, procured, or provisioned cellular network mobile device for business purposes.

New Computer Request [Requires Login]

View Policy »

New York Tech will provide an appropriate computer for personnel who need one to perform their duties under these guidelines.

Record Retention and Destruction Policy [Requires Login]

View Policy »

This policy sets forth principles and procedures that ensure faculty, staff and affiliates at New York Tech properly manage and protect the records it needs to retain, while properly disposing of records that are no longer legally or operationally required.

Remote Work Equipment, Resources, and Technology Guidelines

View Policy »

This policy applies to New York Tech's remote work equipment and resources and provides technical guidelines.

Password Management Policy [Requires Login]

View Policy »

The purpose of this policy is to establish the minimum standards for creation of strong passwords, the protection of those passwords, and the frequency of change.

Verification of Student Identity for Online/Distance Learning

View Policy »

This policy applies to all domestic (U.S.-based) students in all credit-bearing, online/distance education courses offered by the New York Institute of Technology.

Vulnerability and Patch Management Policy

View Policy »

The purpose of this policy is to address how New York Tech assesses and manages technical vulnerabilities to university-owned or managed IT Resources.

Written Information Security Program

View Policy »

This Written Information Security Program sets forth procedures for evaluating and addressing our methods of accessing, collecting, storing, using, transmitting, and protecting personal information.