Frequently Asked Questions

Can I use my domain name that I purchased?

Fully qualified domain names can be used, but with two conditions:

  • With limited exceptions, the canonical/primary domain name for your website must be an institutional domain name, of the format or
  • The fully qualified domain name must be transferred to ITS for technical management

See 11.16 Domain Name Policy for more information.

Are there other content management systems that we can build our website on?

Drupal has been selected as the content management platform for WCMC.

If I build my website myself using a website builder, will ITS support it?

No. Websites doing official college business must be built following the official college website standards.

What support is offered for the website following launch?

We offer a wide range of day-to-day business services to help maintain, optimize, and tune your website as part of your business plan. See the Web Maintenance service for more information.

We have a website design ready, can someone there build it for us?

Websites built for official college business must adhere to design standards as defined by Digital Engagement and External Affairs. Please contact the Digital Engagemeent team for further details.

What if my website shares branding with NYP?

Joint initiatives and units that are housed administratively within the College can have websites developed by ITS. Joint initiatives and units that are housed administratively within the Hospital should contact NYP Marketing for web site projects.

What's the minimum amount of computation that can be purchased?

Right now it's a core-year, designated as 8585 core-hours. The cost is $400 per year. 

Does WCM have a standard biobanking system?

The Institutional Biorepository Core has implemented OpenSpecimen to support solid and liquid specimen collection, processing, storage, and distribution among other workflows

What is the Weill Cornell Medicine password policy?

Please refer to our Password Policy for more information. 

What if I forget my password and the answers to my private questions?

You can call the ITS Service Desk at 212-746-4878 to have your password reset using additional steps. 

What is the maximum file size I can email as an attachment?

The maximum file size is 25 MB if you are sending the attachment via Outlook or Webmail. To send larger attachments up to 35GB, use the File Transfer Service.

What is the "Clutter" folder in my email account?

Clutter is a feature designed to move low priority messages out of your inbox and into their own folder, saving you time when you scan for important messages. Once you activate it, Clutter looks at what you've done in the past to determine the messages you’re most likely to ignore. It then moves those messages to a folder in your inbox called Clutter items.

The Clutter items folder will be available regardless of how you access your account. Clutter and junk email are both filtered out before they reach your inbox. Junk email is evaluated first, and filtered based on the characteristics of the messages themselves, for example the subject or the server it was sent from. Next, Clutter analyzes the remaining messages destined for your inbox, and filters out the types of messages that you usually ignore or don't respond to, based on your past behavior.

Visit the Microsoft website for more information about using Clutter, including how to turn it on and off.

How do I search for NYP contacts in Outlook/Webmail?

NYP did not migrate to Office 365 for its email system, so it is no longer possible to search for NYP contacts using the Global Address Book in Outlook or Webmail.

If you are a WCMC employee and you need to search for an NYP contact, you have two options:

  1. Search for the NYP contact with the WCMC Directory.
  2. Connect to the LDAP Directory. LDAP is an additional directory that will allow your mail client (Outlook for Mac, Outlook for Windows, Apple Mail) to search for NYP contacts. View the "Guide" section of the O365 Email & Calendar page for more information on how to connect to LDAP.

How do I get my smartphone registered?

We put together a couple of step-by-step guides to help you register your phone:

Do I need to take HIPAA training?

Training in the Health Insurance Portability and Accountability Act (HIPAA) is required for all WCMC employees, regardless of whether your work is patient-related. When you begin your employment at WCMC, Human Resources will indicate how you can take HIPAA training in WTMS. This training must be completed within the first 45 days of your employment. Please note that all Weill Cornell employees, regardless of how long they have been working for the institution, may be asked to retake their HIPAA certification when updates are made to the policy. Your department will be notified if you are required to retake the certification.

How can I add course content in LMS for others to see?

Training Administrators and instructors can upload and administer course content in LMS. If you require this access, please contact for more information.

What courses are available in LMS?

There are dozens of courses in the WTMS course catalog. You can view available courses by logging into the Weill Business Gateway and clicking the "My Workspace" tab. Once there, you will find a link to "Learning" and be able to search the entire course catalog to view all course offerings.

What is MobileIron?

MobileIron is a mobile device management (MDM) system that provides ITS with a means of governing mobile access to WCM resources, including email, calendar, contacts, and other central applications. Through the use of MobileIron, which is a free application that is installed on a governed mobile device, ITS has the ability to configure devices with the appropriate WCM settings to allow access to Wi-Fi networks, a WCM email account, and WCM applications. As a benefit to both WCM and the end user, MobileIron helps manage compliance with security policies and other regulations by enforcing device encryption and the use of a passcode to reduce the risk of accidental or improper disclosure of data In the event the device is lost or stolen.

Is MobileIron required for my mobile device?

Yes. Any mobile device (smartphone or tablet) configured with a WCM email account (or wishing to access the WCMC Wi-Fi network) must have MobileIron installed. Without MobileIron, WCM cannot ensure the security of all devices with WCM data. In the event the device is lost or stolen, there are no assurances that WCM data has not been breached or inappropriately disclosed. Weill Cornell's faculty, students, and staff create and share a wealth of information on their mobile devices every day, much of which may be confidential. Should your device become lost or stolen, ITS can locate or wipe your device remotely at your request to make sure this data never gets into the wrong hands. Even if you do not regularly work with confidential data, it can protect the other content on your phone and is necessary for inventory tracking by your department. Not only does it protect you, it protects everyone who does business with Weill Cornell.

But I don't access clinical or confidential data. Do I still need MobileIron?

Yes. WCM's definition of confidential data extends beyond protected health information (see ITS 11.03 - Data Classification). If you use your mobile device to access the WCMC wireless network, you are using Weill Cornell resources and will need to have MobileIron installed.

Can ITS spy on my mobile device once MobileIron is installed?

No, ITS cannot spy on your device through MobileIron, nor is ITS interested in actively monitoring your device. In addition, ITS enforces very minimal requirements and restrictions on your device – a password, which enables encryption. Here are things MobileIron does not do:

  • View or read your SMS and MMS messages
  • View your pictures
  • View your website browsing history
  • Turn on your camera to take photo or video
  • Listen in on your conversations
  • Open or delete your files and applications
  • View contents within your applications
  • Drain your battery

Also, ITS does not read individual emails in your Weill Cornell account, nor can we access any personal email from external sites like Gmail or Yahoo! Mail. ITS uses a data loss prevention software in accordance with College policy (see 11.02 - Privacy of the Network and 11.03 - Data Loss Prevention) to make sure confidential data is not sent to external accounts (those that do not end in without encryption.

It is important to note that although ITS does not actively monitor emails, Weill Cornell reserves the right to access, review, and release electronic information under circumstances necessitated by legal or regulatory requirements.

I lost my device! What should I do?

If your device is lost or stolen, notify the Service Desk and your department administrator immediately. ITS will work with you to locate your device or wipe any Weill Cornell services to prevent a breach of confidential data. If you are unsure of the whereabouts of the device, it is also recommended that you file a police report with campus security of local authorities.

If my mobile device is remotely wiped, will my personal information also be deleted?

No. If your phone is lost or stolen, ITS will only wipe Weill Cornell services. However, if requested, ITS can wipe the entire device. Contact the Service Desk for more information.

What information does MobileIron collect about me and my device?

MobileIron collects the following information about your device:

  • Identifying information about you, the end user, so ITS is aware who the device belongs to. This includes your name and your WCMC email address. 
  • Device specifications, including the make and model of the device you are using, the device's phone number (if necessary), the device's operating system and version, your cellular/data provider, the device serial number, status of the battery percentage, etc.
  • Amount of used and available space on your device.
  • A list of WCMC-deployed (“managed”) applications on your device (ITS cannot see any personal applications that you may have installed).
  • Location data, if you grant permission to the MobileIron application, in the event your device is lost or stolen and you request ITS to help you locate it. Please note that ITS does not use this data to actively monitor your location and it will only be viewed at your request.
  • Status of the MobileIron application, the security certificate, and security status. 
  • An inventory of installed security certificates, security compliance profiles (e.g., password settings), WCMC-deployed (“managed”) applications as well as a log of Mobile Device Management (MDM) communications (e.g., last check-in time with the server, diagnostic errors).

What changes will I see on my device once MobileIron is installed?

When MobileIron is installed on the device, a list of "profiles" with configuration settings will appear under Settings > General > Device Management. Among the profiles is an "Exchange Account" setting, which is a configuration profile that sets up your email and appears in the "Mail" app and the "Mail, Contacts, Calendar" settings. The "Password Policy" profile appears under the "Restrictions" area, which enforces a passcode to unlock the device.

The other settings that are deployed include additional features that provide easy access to the network, such as connecting to WCMC Wi-Fi networks. ITS also has some "web clips," which are bookmarks that point you to WCM Emergency information and other helpful internet resources. ITS can also deploy or publish "managed applications," which are applications that can be used for work purposes, such as Box. ITS also have the ability to deploy paid applications, which may occur in the future.

Most noticeably, you'll see two key apps installed on your device, which are described below:

MobileIron: The MobileIron app allows ITS to apply and enforce certain settings on your device to ensure security. You do not need to configure any settings in this app and will most likely not need to access it. However, ITS can use MobileIron to send important messages to your mobile device and suggest upgrades to applications that are relevant for WCM (e.g., Box, Zoom, etc.).

WCM App Store: The WCM App Store is our internal app store, making applications relevant to the WCM community available for download. Some apps will install directly, while others may lead you to the App Store where you can download the recommended application. You can periodically check this feature in the future as ITS recommends more apps to the Weill Cornell community.

MobileIron also changes security settings on your mobile device once it's been installed. When your mobile device remains idle for a period of time, it will automatically lock and require a passcode of your choosing to unlock it. Per Apple's default settings, if you fail to input the correct passcode 10 times in a row, your mobile device will be completely wiped. (If this happens, you would need to input all your information from scratch or restore your information using a backup from iTunes.)

Can I still access the WCMC Wi-Fi connection and my Weill Cornell email without installing MobileIron?

No, ITS requires MobileIron be installed and configured in order to access these services.

Which devices does MobileIron support?

At this time, MobileIron can be installed on Apple iOS devices (i.e., iPhones and iPads) running iOS 11 or above, and Android devices running Android 8.x or above.

How is MobileIron different on an Android device?

On an Android device, ITS configures an Android Enterprise Work Profile which is a secure environment within your mobile device. The Work Profile separates institutional or enterprise data from your personal data. This separation happens seamlessly and is almost transparent to the mobile device user. It also offers encryption and extra security. This not only encrypts institutional data, but it makes you HIPAA compliant, a prerequisite for mobile data and content at WCM.

On your Android:

  • Applications in the Work Profile will still reside alongside your current applications, but will display a small briefcase badge.

Android enterprise container screenshot

Important: As a part of security and separation within the Work Profile, items may be brought into the Work Profile but not outside of it. You may delete items within the Work Profile, but you cannot save a secured item outside of the Work Profile.

How often will I get an End User digest?

By default, you will receive an End User Digest once a day around 6 p.m. (EST) if messages have been placed into your quarantine since the last digest was sent.

I don’t want to receive End User digests anymore. How do I stop them?

If you don't want to receive a digest, you can change your settings in your Proofpoint account:

1   Log into

2   Click "Profile" on the left sidebar

3   Select "Settings"

In the "My Settings" window, uncheck the box next to "Send digest with new message in my End User Digest." If this box is unchecked, you will no longer receive a digest.

end user digest

What is the Learning Management System (LMS)?

LMS is an online portal that allows WCM students and staff to conveniently review course offerings, register and complete training. Users with administrator/instructor roles can add course content and use LMS to administer training to end users.

What courses are available in LMS?

You can view available courses by logging into the Weill Business Gateway (WBG) and clicking the "My Workspace" tab, and then the "Learning" tile. You will see your own learning portal with courses you can take.

How do I register for courses?

There are three ways to register for courses depending on the course you need to take. One is to self-register. This can be done by logging into WBG and clicking the ESS tab (please review our login instructions). You can browse all course catalogs or search for a specific course.

The second way to register is for a supervisor or Department Administrator to register on your behalf. This may occur if your department determines you need access to specific applications, such as Purchasing in WBG. If this happens, you will receive notifications about how to attend training.

The third way is for a trainer/instructor to pre-register you for a course. Again, you will receive notifications from WTMS via email if this occurs.

I would like to create course content in LMS for others to use. How can I do that?

If you would like to become a Learner Administrator, please contact for more information.

I want to register for a course, but have been denied access. Why?

Not all courses are open to everyone. This is because certain courses require authorization from a Department Administrator.

One example is training for Purchasing in Weill Business Gateway (WBG). A Department Administrator determines who in his/her office will have access to this tool and registers staff accordingly.

If you feel you should have access to a course on WTMS, you can speak with your Department Administrator, or contact the ITS Service Desk for assistance.

Where can I go for support on using LMS?

Documentation on our LMS can be found on Helpfiles. For further assistance, please contact our Service Desk.

Which institutions use eduroam?

eduroam is available at hundreds of educational institutions in the U.S. and thousands more around the globe. To find out which institutions use eduroam, please click the links below: 
U.S. eduroam locations
International eduroam locations

What is eduroam?

eduroam (education roaming) is an authenticated wireless network which allows users from participating institutions to access the Internet from any eduroam-enabled institution.

Who can use eduroam?

While on the WCMC campus: 
At this time, if you work for or attend Weill Cornell, you will not need to use the eduroam wireless network while on campus. You should be using the WMC Secure wireless network to have seamless access to all WCMC resources.

If you are a WCMC visitor, you can log into eduroam provided you are part of a partner institution.

While off campus:
If you work for or attend Weill Cornell and are visiting a partner institution that uses eduroam, you can use your WCMC credentials to log into their eduroam wireless network.

What will I be able to access when logged in to eduroam at Weill Cornell?

• Access to a secure wireless network dedicated to eduroam participants
• Unrestricted Internet access which allows use of email and VPN clients
• Managed access with your home institution username and password 

Does eduroam require a usage fee?

eduroam is free at all partner institutions worldwide. The providers of eduroam hotspots make the service available to benefit all members of the research and education community.

Is eduroam safe to use?

eduroam uses the security and authentication standards of each institution, so you will be accessing wireless service that typically exceeds commercial hotspots. Be aware that when using the general Internet at an eduroam hotspot, the local site security measures at that hotspot will apply to you as well. For example, the firewall settings at the visited place may be different from those you are used to at home, and as a guest you may have access to fewer services on the Internet than you have at home.

Does eduroam work on different platforms?

eduroam works on Windows, Linux, and Mac operating systems.

How do I log in to eduroam?

Connecting to the eduroam wireless is just like connecting to any wireless network on your device. You will use your CWID and password to connect if Weill Cornell is your home institution. 

Where can I find support on using eduroam?

If Weill Cornell is your home institution, you can contact the ITS Service Desk.

If you are from a partner institution, you should contact your home institution's IT help desk.

How can I receive faxes sent to me?

Delivery options for faxes sent to your fax account (if enabled) can be configured for:

  • Email attachment (can be sent to either individual email address, or distribution list)
  • Print (can be printed to any ITS Tagged network printer/Xerox
  • Network Share – can be saved to a network folder
  • Standalone fax machine – can be forwarded to another phone number associated with a legacy standalone fax machine
  • Client – can be viewed using the Rightfax application on your desktop.

How can I send faxes?

  • Configured Xerox MFC
  • Client – Rightfax application installed on your desktop
  • Standalone fax machine – can be sent from an analog line

What is device encryption, and what does it do?

Encryption is a technology that protects the contents of your device from unauthorized access by converting it into unreadable code that cannot be deciphered easily. It is a much stronger level of protection than typical security features, such as logging into an operating system with your CWID and password or protecting individual files with passwords. Whole disk encryption is used to protect the entire contents of your device.

Do I have to encrypt my device?

All devices tagged by ITS and used for WCMC purposes must be encrypted using an ITS-managed encryption solution unless otherwise exempted as defined in the ITS Device Encryption policy (11.06). This is to help protect you if you store, send, or receive any of the following types of confidential data, such as:

  • Social Security Numbers
  • Financial information, such as credit card and bank account numbers
  • Protected Health Information as defined by HIPAA
  • Research information
  • Other WCMC-proprietary information

Many people receive and store this information on their devices, even if they do not realize it, which is why we are mandating encryption on all tagged devices across the institution. The full definition of confidential data can be found in the ITS Data Classification Policy (11.03) and the ITS Device Encryption policy (11.06).

Can I opt out of encrypting my laptop?

Encryption is a relatively easy way to safely secure the data on your laptop from theft, misuse and loss. In the event that an exception to encryption is proposed, you must complete the Request for Device Encryption Exemption form and have the request approved by your Department Administrator, the Department Chair, or an equivalent senior manager. All exemption requests will be reviewed by ITS Security. Any exemption denials may be appealed by the requestor and will be brought to and reviewed by the Information Security and Privacy Advisory Committee (ISPAC). Exemptions are granted temporarily and will need to be recertified annually and/or if the purpose of the device or the job responsibilities of the requestor change. If an exempted device is misplaced, lost, or stolen, all associated costs for forensic investigation and legal and regulatory reporting will be charged to your department. Please contact Brian Tschinkel, Information Security Officer, with questions on this process.

How much does it cost to encrypt my laptop?

For any ITS-tagged laptop, encryption is provided at no additional charge. We are available to assist and provide "best effort" support to encrypt untagged devices that meet our hardware requirements. Users are strongly encouraged to make an encrypted backup of the device data and verify it for accuracy and completeness.

What type of encryption software does ITS use?

ITS uses Microsoft's BitLocker Drive Encryption for devices running Windows 7 or above and Apple's FileVault 2 for devices running Macintosh OS X 10.7 Lion or above. Both of these encryption solutions are native to the respective operating system and offer significant improvement in system performance. Symantec's Pretty Good Privacy (PGP) is being phased out and may only be used to support legacy devices requiring encryption. Mobile devices, such as tablets and smartphones, are encrypted using native device encryption that is enforced by our mobile device management solution.

What can I do if my device does not meet hardware requirements?

ITS recommends Macintosh users upgrade to OS X 10.7 Lion or higher. Encryption solutions for previous versions of OS X, such as the original version of FileVault, do not provide whole disk encryption and are not compliant with the Device Encryption policy. We also recommend that Windows users upgrade to Windows 7 or higher.

I have a desktop computer that stores confidential data as defined in the data classification policy. Can I have it encrypted?

The latest revision to the ITS Device Encryption policy (11.06) now requires that all tagged desktops are encrypted with the ITS-managed encryption solution.

Do BitLocker, FileVault 2, and PGP encrypt my entire hard drive?

Yes! Many types of encryption software do not encrypt the entire drive, but the ITS-managed encryption solutions utilize whole disk encryption, which means every sector of your hard drive will be encrypted.

How long does it take to encrypt my hard drive?

It takes about 15 minutes to install the encryption software, and then between 4 and 10 hours to finish the encryption, during which time you can use your computer normally. After the initial encryption is complete, the encryption should not disturb you while you work.

Will my computer act differently after it has been encrypted?

Devices encrypted with BitLocker Drive Encryption and FileVault 2 will not require any additional steps to access your data. Both encryption solutions are native to Windows and OS X, respectively, and require no additional logins. Legacy devices encrypted with PGP will require an additional password when first powering on your device. This separate password ensures only you can access your encrypted data. You can assign a separate password for this purpose but it can be the same as the CWID password you normally use to log into your computer.

Will my computer run slower once it is encrypted?

Occasionally, there is a minute reduction in computer speed after encryption. In general, this is unnoticeable on all but very old devices, such as those more than four years old.

Should I back up my computer before it is encrypted?

Yes! While we do not anticipate having any problems during the encryption process, it is always a good practice to back up your data to an encrypted removable storage device and verify it for accuracy before encrypting your laptop. If you need assistance with your backup, please contact Support.

I store confidential data on a removable storage device (USB thumb drive, external hard drive, etc.). Can I encrypt my removable storage device using BitLocker or FileVault 2?

Yes, but due to compatibility with different types and versions of operating systems, we recommend choosing removable storage devices that are pre-encrypted that are compatible with nearly any computer. ITS is available to assist in choosing a compatible pre-encrypted drive.

Can I encrypt the device myself?

Yes, but due to compatibility with different types and versions of operating systems, we recommend choosing removable storage devices that are pre-encrypted that are compatible with nearly any computer. ITS is available to assist in choosing a compatible pre-encrypted drive.

What happens if I forget my password? Will I be locked out of my data forever?

No. By utilizing an ITS-managed encryption solution, the recovery keys are securely stored in a central system. If you need to recover your data on devices encrypted with BitLocker or FileVault 2, you will need to contact the Service Desk to validate your identity. A technician will then enter the recovery key to allow you to decrypt and access your data.

If you forget your password on a legacy PGP-encrypted device, you will need to contact the Service Desk and validate your identity. Once your identity is confirmed, the Service Desk will issue you a temporary (usable only once) password and then help you change it to something only you know.

Why and how do you verify my identity if I forget my password?

We verify your identity because we want to ensure you are who you say you are before we give you a password or enter a recovery key to provide access to your data. We do not want someone who has stolen your laptop to circumvent our encryption system by claiming to be you. Prior to encrypting your device, you will be required to sign up for the myPassword management system. You will be asked to answer 5 questions about yourself (i.e., what is your favorite color?, what city were you born in?, etc.). If you forget your password or need a recovery key, the Service Desk will ask you for the answers to some of these questions. Once you have answered them successfully, we will work with you to recover your data as described above. If you cannot remember the answers to your questions, we will require that you visit us and show an ID or, if that is not possible, fax a copy of your ID to us for verification.

How does encryption work?

There are many types of encryption but the basic concept is to encode information (data) so that only those with the right "key" can decode and use it. Keys can be any random string of letters and numbers. For more information about the various encryption solutions used by ITS, visit the links below:

I've already encrypted my device on my own. Do I have to use the ITS-managed encryption solution?

Yes. In order to properly secure and protect the information stored on your tagged device, an ITS-managed encryption solution must be used.

What is the Information Security Breach and Notification Act? What does encryption have to do with it?

The Information Security Breach and Notification Act, or ISBANA, is a New York State regulation that requires institutions such as WCMC that believe social security numbers, bank information numbers, or credit card numbers were stolen or lost from computers they own or operate (such as laptops, mobile devices, or desktops) to publically report the theft or loss to every individual affected. This is an expensive and timely process that could adversely affect the reputation of WCMC.

WCMC is requiring encryption in order to implement extra security safeguards in the event of theft or loss. Lost or stolen encrypted devices are not subject to the notification requirement of the ISBANA regulations.

How does Secure Remote Archive work?

Secure Remote Archive works through a combination of a web client and a small server software running on the user's computer. This allows unattended background transfer of very large number of files of any size.

The transfer occurs between endpoints, which are basically storage places. Typically, one endpoint would be the Remote Archive, which is located in Ithaca, and the other endpoint would be your computer.

What do I need to use the Secure Remote Archive?

To use the Secure Remote Archive, you need the following:

  1. A Globus account (which is available for free at
  2. An account with the Secure Remote Archive (which can be requested using the Secure Remote Archive Request Form in myHelpdesk)
  3. The Globus software, called Globus Connect Personal, which you can install on your computer using the guides here.

Note that your account is separate from your CWID and your Cornell account. If you forget your password, you need to contact Globus for assistance.

How do I use Secure Remote Archive?

Secure Remote Archive works by transferring your files to the Cornell Storage in Ithaca.

  1. Initiate the transfer by logging in the website. The "Log In" link is in the upper right-hand corner of the Globus website.
  2. After you log in, click on File Transfer.
  3. Choose the two endpoints. One is your computer (on the left). The other one is the wcmc# endpoint on the right.
  4. Navigate to the appropriate folders in both endpoints. Select the file(s) you want to move and then click on one of the arrows on top depending which way you want to transfer. The transfer will begin via the Globus Connect Personal application.

Who is listed in the WCMC Directory?

The directory contains information about the following types of active people:

  • employees at WCMC and WCMC-Qatar
  • faculty and non-faculty academics at WCMC and the WCMC Graduate School
  • students (although published information may be limited due to FERPA)
  • affiliates, such as NYP, HSS, or volunteers

Can I remove my contact information from the WCMC Directory?

In accordance with our Directory Policy, all WCMC employees must publish current contact information in the directory. This includes:

Phone numbers
All WCMC employees must have one phone number listed published to WCMC/NYP (preferably the employee’s direct number, otherwise a department number). All exempt employees and faculty must have one phone number published publicly, meaning it is searchable on the Internet (preferably the employee’s direct number, other a department number). This number need not be published publicly for non-FLSA exempt employees.

Email addresses
All WCMC employees must have an email address published publicly. Only email addresses at the following domains are permitted to be published publicly or to the institution:


Personal email addresses or other professional email addresses not ending in one of the above domains can be set to "Emergency" in order to receive important alerts from the college.

All WCMC employees must have a location published publicly. Valid locations are available from the directory drop-down menu.

Who can see my information in the WCMC Directory?

Some information in the directory is required to be public, meaning all users, even those outside of WCMC, can see it (see more information on this). You will notice "Publish to" dropdown menus next to certain fields requesting your contact information. These dropdown boxes control settings of who is able to see your information. These definitions apply to the options for publishing various data:

  • Public: Viewable by all users (e.g., accessible to the Internet)
  • WCMC: Viewable by users logged in to the directory or users accessing from within the WCMC network
  • Department: Viewable by members of your primary department
  • Emergency: Not viewable, but accessible to emergency contact systems

Where does the data in the WCMC Directory come from?

The directory is fed from a variety of sources including:

  • WOOFA: Faculty Affairs system for tracking faculty appointments
  • SAP: Human Resources-maintained system for tracking employees
  • POPS: Physicians Organization Profile System, for tracking clinical contact information
  • AMCOM: NewYork-Presbyterian Hospital phone directory
  • Avaya: WCMC's phone system
  • Jenzabar: Student systems
  • NetID2: NYP employee feed

Is the data in the WCMC Directory shared with other applications?

Data in the directory is or will be used by a variety of applications, including VIVO and Office 365. For example, Office 365 uses your preferred name and title for your college email account. Generally speaking, the following types of data are shared with other applications:

  • Preferred name
  • Email (depending on visibility)
  • Phone number (depending on visibility)
  • Location (depending on visibility)
  • Headshot (depending on visibility)

Can I include a photo of myself in the WCMC Directory?

Yes. All WCMC employees are encouraged to publish a professional business headshot to the directory. This can be done by logging into the system with your WCMC credentials, and then uploading your headshot to your profile (photographs must be a minimum of 200 pixels wide and 72 DPI in resolution). 

Published photographs will synchronize with Microsoft Outlook, Microsoft Lync, and other downstream systems that use directory data.

Acceptable photographs

All directory photos should meet these requirements:

  • Photographs must include the face, head, and shoulders in a plain background not cropped too closely to the head.
  • Photographs must be in color.
  • Individuals should be posed and in professional attire.
  • Photographs must be a minimum of 200 pixels wide and 72 DPI in resolution.
  • Photographs must have been taken within the past five years.

acceptable directory headshot

Example of an acceptable directory headshot

Unacceptable photographs

The following types of photographs are subject to removal if uploaded to the directory:

  • Selfies
  • Pictures taken with a cell phone
  • Action or candid shots (such as sitting at a desk, giving a talk, or during a meeting)
  • Photographs with poor resolution (e.g., blurry or pixelated)

Where to get a professional headshot

WCMC employees may have a professional photograph taken in Art & Photography by contacting Patricia Kuharic at

How do I fix incorrect information in my WCMC Directory profile?

There are some fields you can update yourself, including phone numbers and locations.

Other fields, like title, department, and email address, are verified by other departments, like Human Resources. 

To change your legal name

Please complete and submit a Personal Data Change Form to Human Resources-IMS .

To change your title, department, or administrator/manager

Please contact your Department Administrator, who may submit an Employee Change Form to Human Resources-IMS .

Can I download search results from the WCMC Directory?

Yes. Users who log into the directory may download search results in a spreadsheet format. For example, let's say you want a list of current Department Chairs at WCMC. Search for "Chair," and your search will return a list of current Department Chairs. Click on the "Download..." button and select the format you would like to download the information.

How does the WCM Directory integrate with the Emergency Notification System?

The Emergency Notification System (Everbridge) is used by WCM to alert our community during emergencies. The directory links to the Emergency Notification System and supplies the contact information used.

Be sure to enter all of your emergency contact information, including where you can be reached during off-hours (home telephone, cell phone). You can select "Emergency Only" in the "Publish To" dropdown menu if you do not want the contact information displayed to others in the directory. More information on the Emergency Notification System at WCM is available at

Can I use data in the WCMC Directory to create an advanced report?

Yes. Please contact the Identity Management Team at for assistance.

How do I log into a phone?

By default, your extension should be appearing on your own phone’s login screen. However, if you see a message stating "Enter Extension and press Enter or OK," use your 5-digit extension as your username and password to log in.

Can I log into another person's phone?

Yes. All Avaya phones allow you to log into another user's phone, which is a feature known as Guest Login. This is particularly useful if you have rotating staff using the same desk phone. To log into another phone, push the Home button, select Guest Login on the screen, and use your 5-digit extension and password to log in. By default, Guest Login will expire after 10 hours.

How do I retrieve voicemail when I am away from my desk?

When you miss a call and receive a voicemail, your new phone will automatically deliver the voicemail to your WCMC email account. The email will include an attached .wav audio file of the voicemail message. Additionally, you can call 646-962-6800 from any phone and use your 5-digit extension and password to retrieve your voicemail.

How do I set up my voicemail to go to my WCM email account?

To set up your voicemail messages so they are delivered to your phone, visit, log in with your 5-digit extension and password, and check your settings. You can also place a ticket with the Service Desk.


How do I bypass someone else’s voicemail greeting when trying to leave them a message?

Simply press ** when you hear the voicemail greeting.

How can I log back into my phone if another user is still logged in?

If you are at your own desk and see someone else’s extension still on your phone, push the Home button and scroll down on the screen to Log Out. Your extension should reappear on screen.

What kind of headsets can I use with my Avaya desk phone?

The new Avaya phones support most enterprise class headsets that come with a physical base. Note that you cannot use a Bluetooth headset with these phones unless it comes with a physical base.

ITS recommends the following headsets for the Avaya desk phone: 

Wireless headsets:

Wired headsets:

What should I do if I cannot enroll into/access an LMS course?

If you are experiencing issues either enrolling in a course or accessing training content, please contact the ITS Service Desk at or 212-746-4878 with the following information:

  • Your name
  • Your login information (i.e., email or username used to access course)
  • Your affiliation (e.g., WCMC, NYP, etc.)
  • Your contact information (e.g., phone number and email address)
  • Name of the course

How do I update my email preferences in WRG?

To update your email preferences:

  1. Click My Profile from left navigation pane.
  2. Click Edit.
  3. Click Portal Preferences.
  4. Under the Profile Preferences, choose Yes or No for the "I would like to receive an email when something is assigned to me" question.

What if my entity is not listed in WRG?

If the entity you are trying to select is not in the dropdown list, email with the subject "COI Entity Request" They will add the sponsor on the backend and notify you when you can go back in to select that entity.

What do I do if I'm having trouble finishing my transaction in WRG?

In many cases, the Completed checkbox must be checked before clicking Submit. If this doesn’t work, there may be required fields that are not filled out. Review the form your submitting and check for any errors or missed fields.

If you continue to experience issues, contact the Service Desk.

How do I know if my submission in WRG was successfully received?

You will receive an email confirmation. You will also receive a notification if any action needs to be taken on your submission.

I see I have an Open Action Item. How do I view more details?

If a submission is returned to you, you will see an Open Action Item on first page after login. Click the folder icon to view that action item.

One of my submissions was returned to me requesting more information. Where do I respond?

Click the folder icon in the top left corner of the Action Item. Respond in the comments section of the form.

What if I’m the Principal Investigator on a project for which I’m submitting a Study Specific Report (SSR)?

Select your own name from the dropdown menu.

The Exit button doesn’t work. How do I log out of WRG?

You can log out of WRG by closing your browser window.

What is Two-Factor Authentication?

Two-Factor Authentication is a security best practice that requires more than one type of security method when logging in to an application. An authentication method can include something you know (a password or PIN), or something you have (a unique code).

Two-Factor Authentication adds an extra layer of protection that makes it more difficult for anyone to gain access to your accounts, even if your password has been compromised.

How will my login experience change with Duo?

Your login experience will only change when you are accessing a Duo protected service in a way that it determines two-factor should be invoked, such as accessing myApps from another country.

You will continue to log into the service using a CWID and password, “something you know.” Duo then, based on a policy decision, asks for the second level of authentication by utilizing a code “something you have.” The code can be easily be accessed from a smartphone app, SMS, or voice call.

How do I enroll in Duo?

To enroll in Duo, please visit and follow the instructions on screen to enroll. You can utilize Duo on many devices, including:

  • Mobile phones via app, SMS, or phone call (highly recommended)
  • Tablets via app
  • Landlines via phone call

Does the Apple Watch support Duo?

Yes, Duo supports the use of the Apple Watch to authenticate a user's session and generate a token. More information is available on the Duo website.

Can Duo be used with a physical token?

The Duo service supports the use of U2F and other physical token technology, but ITS will not offer this support until 2016.

What passwords can and cannot be stored in LastPass?

Any business account that you use in the workplace should be stored in your Enterprise account. We recommend that you do not store any personal information in the Enterprise account, but rather in a separate, personal LastPass account. If you ever have any questions, ask your Enterprise administrator. If you do choose to store any other passwords in your LastPass account they must adhere to any policies laid out by your Administrator.

Can I use LastPass on my mobile device?

Yes, with the Premium and Enterprise versions of LastPass you can install the LastPass app on your mobile devices to help manage mobile logins. LastPass supports every major smartphone and tablet, including Android, iOS, and Windows Mobile devices. More information is available here.

Does WCMC see the data in my personal LastPass account?

No, if you use a separate LastPass account for personal passwords, and even if that account is “linked” to your WCMC LastPass account for more convenient access, WCMC does not have any visibility into the contents of that account or your use of that account.

What happens if I forget my LastPass master password?

If you go to log in and cannot remember your Master Password, click on this link to enter your email and have your password hint sent to you. The information that LastPass will email you is only what you entered as your password hint when you registered your Master Password. Neither LastPass nor your company has access to your Master Password and therefore cannot send you more than your password hint, so you may need to initiate the Account Recovery process.

How do I import existing passwords (a.k.a. data) to LastPass?

For details on how to import existing data into LastPass, please see the LastPass FAQ page.

Can I use LastPass on my mobile device?

Yes, with the Premium and Enterprise versions of LastPass you can install the LastPass app on your mobile devices to help manage mobile logins. LastPass supports every major smartphone and tablet, including Android, iOS, BlackBerry, and Windows Mobile devices. More information about using LastPass on mobile devices can be found here.

How do I transfer a call to someone's voicemail without ringing their phone?

During a call, perform the following steps:

  1. Press Transfer.
  2. Press the Message button or dial 16800.
  3. Press *.
  4. Dial the recipient's extension/mailbox number. 
  5. Complete the transfer.


How do I change my phone's password if I use the hot-desk feature and log in at other locations?

To change your password, pick up the receiver and:

  1. Enter the change password code #859 (listen for dial tone).
  2. Enter your 5-digit extension, followed by # (listen for silence).
  3. Enter your current password, then push # (listen for dial tone).
  4. Enter your new password (5 to 8 digits), then push # (listen for dial tone).
  5. Re-enter your new password, then push # (wait to hear confirmation tones).
  6. Hang up the receiver.

What kind of computer should I use at WCM?

ITS recommends several devices that are compatible with our security standards and applications used at WCM. For more information, please visit our Hardware Purchasing page, as well our Operating Systems page to ensure you are compliant with our standards.

Who is eligible to receive the desktop version of EndNote?

All WCM faculty, staff, and students are eligible to receive a free copy of EndNote’s desktop version, but only on an ITS-tagged device. Our licensing allows you to install a copy of EndNote on up to two devices, one of which can be a personal device.

You can also set up an account to access the web version of EndNote. You can create any login you would like (i.e., does not have to include your CWID).

How do I download a copy of EndNote?

Our licensing agreement with EndNote does not allow our users to install the software themselves. However, ITS can install a copy of EndNote on your tagged device, at no cost to you, at the SMARTDesk or by remotely logging into your computer.

Contact our Service Desk and ask one of our technicians for assistance in installing EndNote on your device.

How do I access the web version of EndNote?

Visit and log in. If it’s your first time accessing EndNote online, you will need to create an account on the WCM network by connecting on campus or via VPN. You can create any username and password you would like.

Can I get EndNote if I work or study at WCM, but am on an NYP computer?

The desktop version of EndNote can only be installed on an ITS-tagged device. However, if you are part of WCM, you can still use the web version of EndNote by visiting Make sure you have already set up an EndNote account on our network before using the web version.

What is the difference between EndNote’s web and desktop versions?

Both versions enable you to search, save, and organize your references. The desktop version has more features than the web version, which are listed on EndNote’s website.  

Is there a limit to the number of references I can have in my EndNote account?

If you are using the web version only, you can have up to 50,000 references stored in your account. The desktop version allows for unlimited reference storage. 

If I leave to another institution, do my EndNote References stay with me?

Yes, if your new institution offers EndNote.

Can I connect my personal email account to my WCM Outlook account?

Office 365 Outlook (formerly Outlook Web Access) allows you to simplify your inbox and connect up to five additional email accounts so you can send and read all your email in one place. While this feature would permit you to connect your personal email with your Weill Cornell Medicine email account, ITS does not permit this integration.
Unlike adding separate mail accounts in the Outlook desktop client, connecting email accounts in Outlook on the web downloads and stores all external email messages in your Weill Cornell Medicine account. By virtue of this integration, all personal email will be discoverable and scanned by our data loss prevention software under the same terms as work email, as defined in the ITS 11.08 - Use of Email and ITS 11.09 – Data Loss Prevention policies. In addition, ITS will have no means of separating integrated personal email from work email. Should your relationship with Weill Cornell Medicine end, we will not be able to provide an export of your personal email messages.
For these reasons, ITS does not permit the connection of personal email accounts in Outlook on the web. If you have any questions, please contact Brian J. Tschinkel, Information Security Officer, at

Is SharePoint HIPAA compliant?


Can I share my SharePoint documents with people outside of Weill Cornell Medicine/NYP?

At this time, users that do not have a valid CWID or NYP username and password are unable to access SharePoint sites on the WCM network. This is due to complying with security requirements, including HIPAA, to prevent confidential data from being leaked.

ITS is currently working on integrating our SharePoint system with the Office 365 Cloud service, which should allow users outside of our network to access your documents securely. More news about this development will be distributed when it is available.

How are SharePoint sites typically set up?

Our SharePoint team recommends one SharePoint site per department. This site can be broken down further into specific teams or groups, allowing certain people in your department to have access to necessary files. 

Note that every SharePoint site is customized to your specifications. When you request a SharePoint site, you will meet with a developer who will assist you with creating your site and addressing your department’s specific needs.

What are the recommended uses for SharePoint?

There are multiple ways you can customize your SharePoint site, but these are a few of the features you can have:

  • Document management
  • Lists and forms
  • Workflows – approvals, alerts, and notifications
  • Team sites collaboration
  • Wiki pages
  • Team calendars
  • Discussion board
  • Blog
  • OneDrive
  • Task management
  • Database and custom solutions

Can I access SharePoint from home or off campus?

Yes, if you have a VPN client or access WebVPN (

Can I edit documents within SharePoint?

Yes. SharePoint is ideal for version control to allow multiple users to edit a document and save the latest version online.

You can edit documents in a Microsoft application (e.g., Word, Excel, etc.) or within your browser.

Can I connect my team calendar in SharePoint to my Outlook calendar?

Yes. If you would like to keep track of important dates and events listed in your SharePoint calendar, you can import them into your personal Outlook account.

Instructions are available here

How much storage is available?

Each SharePoint site comes with 5 GB of space for documents. If you require more, that can be configured into your site for an additional fee. Our SharePoint developers will confirm this with you during your initial consultation.

Which bibliographic styles does EndNote support?

EndNote currently supports over 6,000 output styles, making it easy for you to set up your bibliography the way you want it. Many styles are preloaded in the desktop client. A full list of styles is available on the EndNote website, which is also available for download to your desktop client.  

How do I obtain a WCM alumni email account?

If you are a student about to graduate from a degree-granting program, you will receive an email from the Alumni Affairs office with information about registering for an alumni account. Follow the instructions provided. You may also attempt to self-provision your alumni email account by going to

ITS has plans to expand this service to alums that have already graduated from Weill Cornell Medicine. More information will be available in the near future.

Will my alumni email account appear in the WCM Directory?

No, not unless you personally add it to your account.

What happens to my student email account once I graduate?

Upon graduating, you will have 60 days to register for an alumni email account and save any emails from your student account. During this grace period, please inform your contacts of your new alumni email address. After 60 days, your student account will be closed and all of your emails will be lost.

What happens to my student WCM email account if I continue to work at the institution after graduation?

All graduates, whether they stay with WCM or transition to a position elsewhere, will receive a notification to set up a permanent alumni account. If you maintain an active affiliation with WCM, your address will remain intact, and you can also use your alumni account.

What happens to my WCM email if I transition to NewYork-Presbyterian?

A WCM email account can coexist with an NYP account for the same person. Therefore, a graduating student moving to NYP will continue to have the full 60 day grace period to save important information.


How much storage is available in my alumni email account?

Alumni email accounts hold 50GB worth of data. You can view how much storage is left in your account by clicking on the gear icon in the upper right of your account, then clicking General > My Account.  

Do I log into my alumni mailbox with my CWID and password?

No. While your CWID is still the same, your user name to login is your Your password will be separate from your existing WCM CWID account password.

I’m a WCM student. Is there a way for me to access Adobe Creative Cloud?

Please fill out this online form to request an institutional license. Students, as well as other faculty and staff, may use Creative Cloud on public computers in the library. If you would like a personal copy of Creative Cloud, you can purchase it at a discounted rate. Visit to purchase a monthly or yearly subscription to the service with significant savings (you can compare pricing on the Adobe website).

How do I request access to a department file share

To request access to a file share, authorized users can simply log onto, and click “Submit a Request.” Your request goes straight to the appropriate ITS group for fulfillment. 

*Please note: Only owners and administrators of a file share are authorized to submit a Request through myHelpdesk. If you need access to a file share, get in touch with your Department Administrator to verify who can submit a Request on your behalf.

How do we learn how to fill out a File Share Access Request? 

If you need additional support please contact ITS Training at

Why is ITS requiring two-factor authentication?

Phishing is a leading method used by hackers to gain access to your password, data, and compromise your accounts. A second layer of security helps significantly to mitigate this risk.  In fact, two-factor authentication is one of the best ways to protect against remote attacks on WCM accounts such as phishing, credential exploitation and other attempts to takeover your accounts. When two-factor authentication is enabled with web-based applications, such as myApps, remote attackers are unable to access your accounts without possessing your physical device needed to complete the second factor. 

Does the phone on which I’d like to install Duo need to be tagged by ITS?

No, you can install Duo on any device whether it is tagged by ITS or not.

Do I need to be connected to the Internet to use the Duo app?

No. After you register with Duo, using the app does not require Internet connectivity. If your phone is not connected to the internet and you need to use the Duo app, choose the “Enter a passcode” option as an authentication method as shown on the screen below. This screen should appear when you try to login to a site that requires two-factor authentication.

Then, get your passcode by tapping the key button on your Duo app screen. This works anywhere, even in places where you don’t have an internet connection or can’t get cell service. 

If I travel abroad and buy a local phone/SIM card while I’m there, can I still use Duo to access the network?

Yes. To do this, you can borrow a FOB Key (a small authentication device) from ITS. Please stop by the SMARTDesk at 1300 York in the Library a few days prior to your departure to borrow a Duo FOB. If you travel frequently you may want to purchase your own key ($18 to $50). We suggest either the FIDO U2F Security Key, YubiKey 4 or YubiKey 4 Nano. .

If you travel abroad and use your own phone, use the “Enter a Passcode” authentication method to access Duo enabled sites.  

Do I need to re-register my email account when I install Duo?


I would like to purchase my own FOB Key to access Duo. What kind do you recommend?

We suggest either the FIDO U2F Security Key, YubiKey 4 or YubiKey 4 Nano. .

How do I reset my voicemail password if I forgot it?

If you've forgotten your voicemail password, please send an email to with the following information:

  • A photo of your WCM ID to verify your identity
  • Your 5-digit phone extension

Our technicians will help you reset your account to create a new password.

I am purchasing a standard computer with institution funds but it will be used strictly off-campus. What should I do?

Please contact for assistance. 

I want to buy one of the standard Dell bundles but need more memory or a bigger hard drive. What should I do?

Customers can now customize Dell bundles directly in the SciQuest Dell Punch-out site. You do not need to request a quote from our Procurement team. The pre-configured bundles are set with options that allow for faster shipping. While things like hard drive and memory can be upgraded, there will be an additional cost and will require 2-3 weeks to configure.

How do I purchase a workstation?

Visit the SciQuest Punch-Out site in the Weill Business Gateway and select from our various options. No quote is needed from our Procurement team to make a purchase.

How do I know if I device I want to purchase is considered standard?

Please visit our Standard Computer Specs page for more information.

What if I want to purchase an HP or other computer?

If you purchased a standard HP desktop, laptop, or workstation prior to October 25, 2016, you will continue to be billed at the ITS standard rate. However, after this date, all new HP computers connected to our network will be billed at the higher non-standard rate.

Can I purchase an ITS standard computer model through a different vendor, such as CDW-G or Best Buy?

While a model similar to one of our standards can be purchased from a different vendor, ITS cannot guarantee it will work with our approved operating system and applications.  For Windows systems, ITS works closely with our vendors and system manufacturers to select the configuration that will work best with our IT services.  The system will be billed at the higher non-standard rate, will require additional time to setup, and additional ITS consultation fees will be incurred to connect the computer to the WCM network.

For Apple systems, ITS has arrangements with Apple to give us the best pricing possible

I’m getting a much cheaper price for a computer from another vendor. Should I buy it?

No, ITS strongly recommends against this.  Many cheaper computers available on the market are intended for home use and generally do not meet our minimum requirements.  ITS standard bundles are enterprise computers certified for extended use, which meet or exceed our minimum requirements, and are easier to service and maintain.  If you still decide you want to purchase, please note the computer will be billed at the non-standard rate, will incur higher tag/connect fees, and will incur additional consultation fees for set up.  Additionally, if the unit does not have a TPM chip, additional approval will be required from our ITS security team to allow the unit to be connected to the network.  These devices are also not eligible for two-day connect.

Are computers that are out of warranty still supported?

ITS standard bundles come with a 3-year warranty, including HP systems purchased prior to October 25, 2016.  Costs for defective parts are generally covered by the system manufacturer during this period.  While systems may be used past the warranty period, ITS recommends against this.  Most defective parts are generally not covered and repairs may be at more cost to you.  Additional ITS consultation fees may also apply.

What does “ship within 8 days” mean?

All vendors require WCM to provide a legal document referred to as a purchase order before they release any goods. Purchase orders are issued to the vendor once an order is fully approved in the Weill Business Gateway (WBG). Once the approved purchase order is received by Dell, the computer will be configured and shipped out within 8 days.

Which ITS-supported vendors should I order computer equipment from?

Dell and Apple products (except iPhones) should be purchased through the SciQuest Punch-Out site in the Weill Business Gateway. Other hardware (e.g. printers, scanners, adapters etc.) can be purchased through CDW-G via quote by emailing

Should I get extended coverage for my desktop, laptop, workstation, or tablet purchases?

ITS highly recommends extended warranty coverage for electronic equipment.  While Apple hardware does not currently come with Apple care, it should be purchased. The ITS-approved Dell bundles in SciQuest already include extended warranty coverage for three years.

Can I use the cloud storage feature from Creative Cloud?

No, Adobe Cloud storage is not available for storing WCM data.

Who do I contact for shipment status on the product I ordered if I don’t get any updates from the vendor directly?

Please contact and our Procurement team will contact the vendor for shipping/tracking information.

Who do I need to contact if I need to return the product I ordered?

Please contact so our Procurement team can contact the vendor for a Return Merchandize Authorization (RMA). The RMA takes a few days and will be sent to our Procurement Specialist, who will forward it to you with the electronic return label.

Please note that no exchanges are allowed with our vendors. A new purchase order will be required if another product order is needed. The fund account will be credited once the vendor receives the returned item.

Am I allowed to exchange products if the order is incorrect, unsatisfactory, or defective?

No exchanges are allowed with our vendors, but you can return the product. A new purchase order is required for the new product. The vendor will send a credit memo, so your fund number account is credited accordingly through our Accounts Payable department. Please contact and our Procurement Specialist will contact the vendor for a Return Merchandise Authorization (RMA).

Who do I contact if I don’t know what specs to get for my computer?

The standard devices recommended by ITS should meet most needs.  However, if you are uncertain, please contact and a Procurement Specialist will provide recommendations based on your work-related needs.

What comes with my desktop? Do I get a keyboard, mouse, and monitor?

The desktops comes with a keyboard and mouse, but a monitor would need to be purchased separately. You can view our monitor options on our Standard Computer Specs page

Does WCM-ITS have a standard for monitors?

Out standard size is a 24” Dell Ultrasharp monitor.  If you require a different size monitor, please contact and a Procurement Specialist will provide recommendations based on your work-related needs.

Can I download Office 2016 for Macs?

Yes, Office 2016 for Macs can be downloaded on an ITS-tagged machine via the WCM App Store.

Note that Office 2016 is only available for macOS Yosemite (10.10), El Capitan (10.11), and Sierra (10.12). If you are running an older version, you will not see Office 2016 available for install in the WCM App Store as it will not run. If you are running 10.10 or higher and you still do not see it please contact the Service Desk.


What’s new with Office 2016?

Office 2016 includes updated versions of Outlook, Word, PowerPoint, Excel, and OneNote. Although the interface has slightly changed, any user familiar with these tools should be able to quickly navigate the applications, and notice improved performance. Click here for more on What’s new in Outlook 2016 for Windows.

How do I configure Outlook 2016 to connect to my WCM email account?

After you install Office 2016, you will need to set up your account in Outlook 2016 in order to access your WCM email. Click here for instructions on how to configure your account in Outlook 2016.

Can I still use Office 2013 after I install Office 2016?

No. Office 2013 and 2016 cannot co-exist on your computer. If you install Office 2016, Office 2013 will be deleted.

What's new with Office 2016?

Office 2016 includes updated versions of Outlook, Word, PowerPoint, Excel, and OneNote. Although the interface has slightly changed, any user familiar with these tools should be able to quickly navigate the applications, and notice improved performance. Click here for more on What’s new in Outlook 2016 for Windows.

Do I have to upgrade to Office 2016?

No, upgrading to Office 2016 is not mandatory. 

I’m already running a trial version of Office 2016. What should I do?

If you are already running a version of Office 2016, for example a trial or preview, please uninstall that version first before attempting to install from Self Service.  Instructions to uninstall can be found here: Uninstall Office 2016 for PC

What version of Windows should I be running to install Office 2016?

Office 2016 can only run on Windows 10, Windows 8.1, Windows 8, Windows 7 Service Pack 1, Windows 10 Server, Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2. For the best experience, use the latest version of any operating system. 

Click here for more information on system requirements for Office 2016.

Are there any known issues and incompatibilities with Office 2016?

  • Microsoft 2016 installation will crash if you have any MS Office applications open when you install. Close all Office apps before you install.
  • Adobe applications older than v. 11.08.16 are not compatible with Office 2016 and will cause performance issues.

How do I request the creation of a WCM email/calendar account?

As of January 23, 2017, a specific subset of WCM faculty, staff, and students will get Office 365 email/calendar accounts created automatically when their CWID is created. 

Office365 email/calendar accounts will be automatically created for:

  • Exempt, non-exempt and temp employees at WCM
  • Full-time employed faculty at WCM
  • Students enrolled in certificate, masters, MD, PhD programs (does not include Tri-Institutional PhD students)
  • Temp employees from agency at WCM

All others should ask their departmental or divisional administrator to activate the account via the Identity Dashboard. 

How do I access Box?

Go to, or, and input your CWID and password.

What is the file size limit when uploading to Box?

There is a 15GB file size limit.

Can I use Box to store sensitive data that is covered by laws such as HIPAA and ePHI?

Box should NOT be used to collect, process, store or share ePHI, FERPA, PII or sensitive restricted data until further notice. This service should never be used to store high-risk data, as outlined in our Data Classification policy:

data classification chart

Which web browsers does Box support?

Box supports the latest versions of Internet Explorer and Safari, the latest release version of Chrome, and the latest version of Firefox. For more information and to view the list of officially supported browsers by please visit the Box website

Where can I go for additional Box help?

More info is available at and on Box’s support site. Help is also available from the ITS Service Desk.

What are the benefits of Box over other popular commercial services, like Dropbox?

Dropbox and Box share some of the same functionality. However, Box is designed for enterprise-level solutions for large organizations while Dropbox is geared toward consumer use.

Box offers features like content and task management, online workspace for collaboration, user and group permissions, admin account transfers, and a built-in editor. In addition, Box can be used securely over the WCM network, using your institutional credentials to log in.

How do I download Box Sync?

Box Sync allows you to mirror data stored on Box to your desktop. You can then navigate and modify content stored on the Box website through your computer's native file browsing interface, without using a web browser. Content that syncs down to your computer are available for offline access.

To install Box Sync, you must be on a managed device. For Windows users, this means that when you log into your machine and go into your Start Menu, you will see a program called Software Center to install ITS-approved applications (read download instructions for Software Center). Managed Mac devices all have an ITS tag number and an application installed called Self Service. Self Service permits you to download Mac versions of ITS-approved software (read download instructions for Self Service).

Please note that if you attempt to download Box Sync from the Box website, it will not work on ITS-managed devices.

What service can I use to store PHI?

Departmental file shares, OneDrive, and SharePoint are appropriate for storing PHI.

Can I synchronize Box data on any device?

Box Sync, the application used to synchronize your Box files locally to your computer or mobile device, can only be installed on a tagged and managed device. This restriction is in place to ensure Box data is not permanently stored on unknown or unmanaged WCM devices.

How can I access my Box data from an untagged device?

You can access your Box data from any internet-connected device by going to the Box website at

Why use the web and desktop version of Box Notes?

The good thing about the desktop app is that you can create and edit Box Notes any time instead of logging into Box and searching for a note you may have already started. Notes you create in the desktop app sync to your account automatically. Plus, the desktop app keeps your notes in one place instead of trying to remember which folder you placed a particular note. Note that you cannot include high-risk data, like HIPAA or PHI info, within your Box Notes (see Section I of our Data Classification policy).

Can I use the Box Notes desktop application offline?

No, you must be connected to the Internet in order to use the desktop application. This allows your notes written in the desktop version to sync to your Box web account, so you can access your content from either application.

What if I need to host a Zoom meeting for more than 300 people?

If you need to host a larger meeting or webinar, please see this myHelpdesk article for instructions.

Why can’t I log into Zoom?

Log into your WCM Zoom account at with your CWID and password. If you are having issues logging into Zoom please email

Is Zoom HIPAA compliant?

Yes, Zoom signs the HIPAA Business Associate Agreement (BAA) for healthcare customers like WCM, meaning that Zoom is responsible for keeping patient information secure and reporting security breaches involving personal healthcare information. Zoom protects and encrypts all audio, video, and screen sharing data. You can use Zoom’s screen sharing, and video and audio conferencing to meet with patients and other healthcare professionals. 

Even with these security measures in place, ITS strongly advises that you do not share PHI or PII-related information via screen sharing, recording, and file sharing to protect confidential data at the college. For more information on Zoom and HIPAA, click here.

To ensure that your Zoom meeting meets HIPAA security standards:

  • Do not list your meeting publicly
  • Require a meeting password:
    • Log into your Zoom account and click “Schedule”
    • When the “Schedule a Meeting” window appears, under Meeting Options select “Require meeting password” and input your desired password.
    • Participants must input the password in order to join the meeting. The password can be included in the Meeting invitation.



Can I schedule and start a Zoom meeting from from Outlook?

Yes. First you need to install the Zoom Microsoft Outlook Plugin. The Zoom Microsoft Outlook Plugin is designed to make scheduling a meeting in Microsoft Outlook quick and convenient. The Plugin allows you to schedule and start instant Zoom meetings, as well as make existing meeting events Zoom meetings. The Outlook Plugin will also sync free/busy times to the Zoom Client based on your Outlook Calendar events (requires version 3.5 or higher - download the latest version).

For more on how to schedule a Zoom meeting from Outlook go here How to Use the Microsoft Outlook Plugin.  

Can I schedule a recurring Zoom meeting?

Yes. When you open the Zoom Scheduler in your Zoom account, you can select various different settings for your meeting. To schedule a recurring meeting, check the box next to “Recurring Meeting” in the Zoom Scheduler. The meeting ID will be the same for all instances of the recurring meeting. For more information on how to schedule a meeting go here How to Schedule Meetings

Is there a limit to the number of people I can have in my Zoom meeting?

Yes. You can have 50 people in a regular Zoom meeting. 

How do I share my screen during a Zoom meeting?

Zoom allows for screen sharing on desktop, tablet and mobile devices running Zoom.

  • The host and attendee can screen share by clicking on the Share Screen icon
  • The host does not need to “pass the ball” or “make someone else a presenter” to share
  • The host can “lock screen share” so no attendee can screen share.

Here are step-by-step instructions on How to Share Your Screen During a Zoom Meeting

How do I share a PowerPoint presentation during my Zoom meeting?

Dual Screen: If you are screensharing with PowerPoint and have a dual screen or secondary projector, please click Swap Displays to switch the presentation screen during Slide Show Mode.

Slide Show in Full Screen and Chat: If you are showing a presentation in Full Screen and you want to use the Chat feature in Zoom, please change the Set Up Show to Window mode.

 More information here:]


How do I join a Zoom meeting from a PC or Mac?

There are several different ways to join a Zoom meeting from your Mac or PC, including by email link, web browser or Zoom app. Here are step-by-step instructions on How to Join a Zoom Meeting.

How do I join a Zoom meeting from mobile device?

Here are step-by-step instructions on How to Join a Zoom meeting from Android or iOS. 

I scheduled my Zoom meeting for one hour. Will it end automatically when the hour is up?

No, the meeting will not end until the host ends the meeting. 

Can I schedule a meeting and make someone else the host?

Yes. To pass “Host” permission to another participant select “Manage Participants” from the Zoom meeting window. Then, select More next to the participant you'd like to make host and select "Make Host." 

How do I host or join a scheduled Zoom meeting?

If you are the HOST and you need to start a meeting, you have a few options:

  1. Click the URL Link the the calendar invitation or calendar reminder
  2. Copy the URL link and past it into your browser’s address bar
  3. Log into your Zoom account at weillcornell.zoom/us, find the meeting, click Start
  4. Start the meeting from your Zoom client directly

 If you are a participant and you need to join a meeting, you have a couple options:

  1. You can click the URL Link that is in the description section of the calendar invitation or calendar reminder.
  2. You can copy the URL link and post it into your browser’s address bar
  3. Start the meeting from your Zoom client directly. Click on Join and then enter your scheduled meeting ID to start the meeting. (The meeting ID is the 9-digit number at the end of the URL link)

For more details read How Do I Start or Join a Scheduled Meeting

How do I provide a reusable meeting link for all the Zoom meetings I host?

Your Personal Link/Personal Meeting ID can serve as a reusable link for any Zoom meeting you host. You can use this to start an instant meeting or schedule a meeting in the future. To view and/or modify your Personal Link or Personal Meeting ID:

  • Sign in to your Zoom account at weillcornell.zoom/us with your CWID and Password
  • Click on Profile on the menu on the left-hand side of the screen
  • You can view your Personal Meeting ID and your Personal Link. You can copy and paste either of these links to invite someone to join your Personal Meeting Room. 

What is a Personal Meeting ID and Personal Link?

You can use your Personal Meeting ID and/or Personal Link it to start meetings at any time or schedule meetings for future use. 

  • A Personal Meeting ID is assigned to you automatically as a permanent virtual room.
  • You Personal Link is your personal URL associated with your Personal Meeting ID.

To learn how to customize your PMI and Personal Link click here

Can I upload files to a Zoom meeting?


What is the difference between WebEx and Zoom?

This article published by IT@Cornell summarizes the difference between these two video conferencing tools. WebEx will be phased out at WCM in June 2017. Read What it the difference between WebEx and Zoom?


How do I record a Zoom meeting?

Recording for WCM Zoom is local only. References in the vendor documentation to cloud recording does not apply.

How do I use a Zoom whiteboard?

The Zoom whiteboard feature will allow you to share a whiteboard that you can annotate on with others.

How do I share my screen during a Zoom meeting?

Zoom allows for screen sharing on desktop, tablet and mobile devices running Zoom.

  • The host and attendee can screen share by clicking on the Share Screen icon.
  • The host does not need to "pass the ball" or "make someone else a presenter" to share. 
  • The host can "lock screen share" so no attendee can screen share.

How do I share a file during a Zoom meeting?

In-Meeting file transfer allows you to send files to other meeting participants once in a meeting. 

Note: This feature will not work in Zoom Webinars and will not work if End-to-End encryption is turned on.

Can I join two Zoom meetings at once?

You can be in more than one Zoom meeting simultaneously, but not on the same device. For example, you could join one Zoom meeting on your desktop, and another from a phone or tablet. 

I am a hiring manager/administrator who received an error message when I clicked on the Recruiting Management tile in My Workspace. What should I do?

If you receive the error message below, it means you have no job requisitions available:


However, if you are expecting to see a job requisition and you continue to see the error, please contact the HR Solution Center at or 646-962-9247.


Why can’t I see the My Workspace tab when I log into the Weill Business Gateway?

By default, the My Workspace tab is the third tab you should see when you log into the Weill Business Gateway (WBG). However, if you had previously customized your tab order, My Workspace will appear at the very end of your tabs. Depending on how many tabs you have access to, My Workspace could be pushed off the screen. You can reset your tabs or move the My Workspace tab to your preferred location to see it.

To reset your tab order, click the Personalize link above all of your tabs, and select Reset Order of Tabs:

To move your tabs around, hover your cursor over the top-left corner of any tab until a shaded triangle appears, and then click and drag it to the location you prefer.

I am a Learning Administrator. Why can’t I access the Learning Administration dashboard in the LMS?

If you are a Learning Administrator and you cannot access the Learning Administration dashboard, please confirm that you have logged into the Weill Business Gateway using myApps. This dashboard is only visible via myApps. To access the Learning Administration portal via myApps:

  1. Visit
  2. Log in with your CWID and password.
  3. Click the WBG icon.
  4. Click the My Workspace tab and select the Admin Center tile in the pop-up menu.
  5. Type "Learning Administration" into the search bar at the top of your screen as pictured below:

Why do I see a pop-up blocker error message when I click on a tile in My Workspace?

You may receive the following error if you are in the Weill Business Gateway (WBG) while using Internet Explorer 11:

This may appear if you click on the following tiles: Learning, Careers, My Dashboard, Recruitment, or Admin Center. To avoid this issue, please sign into WBG via myApps by going to, signing in with your CWID and password, clicking the WBG icon, and then launching the My Workspace tab.


I have a CWID and password. Why can’t I access Learning (LMS), My Dashboard, or Careers?

You are most likely receiving an error when attempting to access Learning, My Dashboard, or Careers, because the system does not yet have a profile for you.

New WCM Employees

If you are a new WCM employee, in most cases, access should be provisioned within one to two days of completing your onboarding paperwork with Human Resources.

New WCM Non-Employees

If you are a new WCM non-employee, in most cases, you will receive a system-generated email informing you that you have been assigned training in the Learning system. In other cases, your WCM sponsor or contact may inform you that your access has been set up, with instructions on how to log on to take training.

For more assistance, please contact the ITS Service Desk at or 212-746-4878 with the following information: 

  • Your name
  • Your login information (CWID)
  • Your affiliation (e.g., WCM, NYP, etc.)
  • Your contact information (e.g. phone number and email address)

How can I map my departmental file share to my computer?

Please follow these instructions to manually map a departmental file share to your Windows or Mac computer.

I have a CWID and password. Why can’t I access Weill Research Gateway (WRG)?

You are most likely receiving an error when attempting to access Weill Research Gateway because the system does not yet have a profile for you.

New WCM Employees

If you are a new WCM employee, in most cases, access should be provisioned within one to two days of completing your onboarding paperwork with Human Resources.

New or Existing WCM Non-Employees

If you are a WCM non-employee and require access to WRG modules, please contact WRG Support at or 212-746-4878 (menu option 2, then option 1), with the following information:

  • Your name
  • Your login information (CWID)
  • Your affiliation (e.g., WCM, NYP, etc.)
  • Your contact information (e.g. phone number and email address)

Sometimes when I dial an external, 10-digit phone number, the call doesn’t go through (i.e., calls made to “201” and “947” area codes). What should I do?

Make sure to dial “91” before placing a call to these area codes.

I’m using the Windows or MacOS app, and don’t hear any audio. What should I do?

Click the Settings icon, and select “User Preferences”. Then select “Audio/Video”, and ensure the appropriate device and sound level are selected for the Microphone and Speaker settings. 

How do I change the display options available in the app (i.e., I don’t want to display the “Next Meetings” option)?

Click the Top of Mind option at the top of the app. Click Hide to hide an option from your display, or click Show to display the option.

softphone display options

Can I use Box to collaborate with colleagues at Cornell University?

Weill Cornell Medicine Box users can collaborate with faculty, students, and staff at Cornell's Ithaca campus by logging in to Box through the WCM authentication system in their browser before accepting a Box invitation. To access Box, WCM users can go to and input their CWID and password. Learn more at WCM Box Cloud Storage.

It's recommended that WCM Box users authenticate through the WCM system. If accessing Box through CUWebLogin at, WCM users should select "Not a part of Cornell University," enter their WCM email address and password, then authenticate to the WCM system.

Can I use OneDrive to store and share HIPAA or PHI-related content?

OneDrive is the preferred method for storing WCM high-risk data (i.e. PHI, PII) in the cloud.

Currently, you can use OneDrive to share high-risk data only with Weill Cornell Medicine faculty, staff, and students. We are working rapidly to enable external data sharing and collaboration with affiliate institutions, including NYP.

Can I use Teams to chat with anyone at WCM?

Yes, if your contact has an email address, they will be available on Teams. Please note that this does not include WCM-Qatar or Cornell Ithaca.

Can I use Teams to chat with people outside WCM, like NYP staff?

Outside users from certain peer institutions (like NYP, MSK, and the Ithaca campus) can be added as guests to Teams by submitting a request. Guests have limited access to Teams functions, which is detailed in this Microsoft Guide. We are exploring solutions to cross-connect our chat systems with NYP and will have more information in the future.

Can I share high-risk data (like HIPAA-protected patient data) through Teams?

 Yes! For most regular use cases, especially with other WCM faculty/staff/students, Teams can be used for collaboration on high-risk data.

Is Teams replacing Zoom?

There are currently no plans to replace Zoom. We still recommend that you use Zoom for pre-scheduled meetings, especially with attendees who are outside of WCM. Teams has collaboration features that let you quickly turn a one-off chat into a screenshare or video call.

We use Skype for Business all the time. Is it going away?

Yes, Skype for Business will be phased out in Spring 2020. We recommend you move to Teams soon to simplify your transition in the spring.

Can I share files on OneDrive with people outside of WCM?

ITS has an approved list of affiliates you can share data with on OneDrive. You can share files with anyone using these domains in their email address: 


On which devices can I use OneDrive, or install the OneDrive sync client?

The OneDrive sync client can be used on Windows and Mac computers. The OneDrive mobile app can be used on iOS and Android devices. Windows 10 ships with the sync client already installed, but please note the PC needs to be ITS-tagged and domain-joined in order to use OneDrive sync with your WCM account.

How much data can I store in my WCM OneDrive account?

You can store up to 1 Terabyte (TB) of data. Special requests can be made for up to 5TB of data, if required, by opening a ticket in myHelpdesk.

Can I request to share files with an external party or institution that is not on the approved list?

Yes. Please open a ticket on myHelpdesk. Include the details of the request, the name of the external institution, and the recipient's email domain name. 

Can I store Protected Health Information (PHI) in my LabArchives account?

PHI can be stored in LabArchives. Notebook owners and administrators are responsible for ensuring that PHI within a notebook is not shared with anyone except for individuals explicitly authorized according to the IRB and Data Use Agreements. This applies both to sending of exported notebook material, and to providing shared access to a notebook or notebook pages.

How can I tell if I'm being recorded on Zoom?

When attending a Zoom meeting, the host has the ability to record meetings and can manage recording access for other participants in attendance. 

To confirm if a meeting is being recorded, look for the red circle in the top-left side of your Zoom window with the word Recording: 


Information on how to record and manage recording settings is available on myHelpdesk. 

Note that while you can see that a meeting is being recorded, Zoom does not provide any indication when a participant takes screenshots of the meeting window. Please exercise caution and do not display any sensitive data.  

Can I store Intellectual Property in my LabArchives account?

Intellectual Property can be stored in LabArchives with appropriate user precautions to protect data as in any other tool. For more information, contact

Will LastPass or ITS know the passwords stored in my LastPass accounts?

No. LastPass employs a "zero-knowledge" security model. This means that all sensitive data is encrypted locally at the user's device with a key that is never shared with LastPass or ITSThis model was put to the test during a network breach in June 2015. While master usernames and other data were breached, the encrypted user vaults remained secured. LastPass took immediate action to lock down user accounts and to inform its base. 

Is LastPass the same company as 1Password or OnePass?

No. While these companies offer similar password management services, LastPass is its own unique product and company, with its own special set of features. Visit the official  LastPass FAQ page 

How is LastPass different from myAccount?

myAccount is our official password management service for WCM. It is where you will go to create or change your official WCM password. However, LastPass can be used as an optional support tool to help you manage passwords for both WCM and your personal accounts. It can also help you remember longer and various passwords, if you tend to forget them. It is safer to have LastPass manage your passwords rather than write down what your passwords are somewhere else.  

How does eConsent work?

A computer or touchscreen device can be used to complete eConsent. The participant’s signature will be captured digitally via the signature field.

eConsent can be used in-person, or remotely. If eConsent is used as a method of remote consent, the subject will need to provide an email address to access the eConsent tools. However, please be aware, if you do not use WCM approved tools for remote consenting, it does not qualify as eConsent and you will not be able to collect valid electronic signatures. For further information on remote consenting methods, please refer to the FDA guidance.

What eConsent options are available?

WCM currently supports two eConsent tools: REDCap and DocuSign. 

How can I use eConsent?

Both REDCap and DocuSign are available to WCM/NYP researchers. Currently for FDA-regulated studies, which require 21 CFR Part 11 compliance, only DocuSign can be used. For studies that are not FDA-regulated, REDCap can be used.

What approvals are needed to use eConsent?

All use of eConsent must be IRB approved before it can be implemented. Downloadable template language that can be used in the IRB application is available within the JCTO Researcher's Toolbox, titled "Remote Consent IRB Submission Language" under the Regulatory Tools and Templates section. Study teams must also have an IRB stamped ICF.

Does eConsent support ICFs in multiple languages?

Please email for additional information.

What special considerations should be given to the use of eConsent for pediatric studies?

Please email for questions regarding use of eConsent for pediatric studies.

Are there fees associated with eConsent?

REDCap eConsent is a free service provided by the CTSC. Any enhanced services (e.g., project build-out by CTSC member) may require a fee. DocuSign eConsent is fee for service. Current fees can be found on the JCTO website.  Questions regarding the cost of service or billing should be directed to:


How do I request and build a REDCap eConsent project?

Study teams can request a REDCap eConsent project by emailing

REDCap eConsent projects are standalone projects that are separate from REDCap data collection projects; this includes projects that have patient questionnaires. For existing studies, study teams will need to create a new separate REDCap project for eConsent, which ensures that personal identifiers collected on consent forms (e.g., full name, date, e-mail, phone number) are stored separately from participant ID and study data.

I have created the REDCap project. Can I begin consenting?

Once you have created the REDCap eConsent project in development status, the next step is to promote the project to production status within REDCap and email

Once it has been submitted, the project will undergo review by the JCTO. The study team will be notified within one week if the eConsent project has been approved or additional changes need to be made.  Consenting within REDCap cannot begin until the REDCap eConsent project has been approved.

Does REDCap eConsent support ICF amendments or changes?

REDCap eConsent supports version control of the ICF documents.

Once the IRB has approved a protocol amendment or continuing review  that include changes to the ICF, these changes can be made in REDCap by the study team.  Any change to the ICF requires re-review by the JCTO by emailing It is the study teams’ responsibility to keep the eConsent up-to-date, including amending the project every year after the IRB issues a newly stamped ICF at the time of continuing review (even if there are no other changes).

Will participants get a copy of their consent?

The REDCap eConsent form can be designed to send the participant an email that includes a PDF of their signed consent form. Please email for guidance.

How can the study team get access to the completed consent forms?

Signed consent documents will be housed electronically in REDCap's File Repository.

Do I need to upload the eConsent into Epic and OnCore since it’s stored in REDCap?

Yes, REDCap eConsent will create a PDF of the document which you will need to download and upload into OnCore and Epic.

How do I request a DocuSign eConsent?

Please contact to request an account.

How do I login to DocuSign?

Once your account has been activated by the JCTO, login via and enter your WCM/NYP email address and follow the single-sign-on process.

I have created my eConsent in DocuSign, can I begin consenting?

Yes, you can begin a soon as you have created your template. You do not need validation from the JCTO.

Does DocuSign eConsent support ICF amendments or changes?

DocuSign eConsent supports version control of the ICF documents.

Once the IRB has approved a protocol amendment or continuing review that includes changes to the ICF, the updated ICF can be uploaded into DocuSign by the study team. It is the study teams’ responsibility to keep the eConsent up-to-date, including amending the project every year after the IRB issues a newly stamped ICF (even if there are no other changes).  The JCTO does not need to review any updates to the eConsent in DocuSign.

Will participants get a copy of their consent from DocuSign?

Yes. Once the ICF is completed by all parties, the participant will receive an email with a link to download the fully executed ICF. The study team should explain to participants that they should download the PDF as soon as possible, because it will only be stored in the DocuSign repository for 12 months.

How can the study team get access to the completed forms in DocuSign?

The consenting investigator will automatically have access to the completed ICF and should ensure they download it for their research records as soon as possible as it will only be stored in DocuSign for 12 months. DocuSign can be designed to send a link to other study team members as well. Please refer to the DocuSign knowledge base article for guidance.

What happens to my LastPass account if I leave WCM?

Your institutional enterprise account would be converted to a personal LastPass account if you leave WCM. Items that might have been shared with you among WCM colleagues within the enterprise account would be lost, but personal items saved in the enterprise account would remain available to you. To ensure no data loss, we recommend that personal items are stored in a personal consumer LastPass account. That personal account can then be linked to the enterprise WCM account. While you are at WCM, you can login and use your WCM account as your daily driver with all the premium features and access to the personal identities, due to the linked account setup.  

You can find out more about linking your accounts together in our LastPass guide


How do I access the Apollo wireless network?

  1. Go to This site is only accessible from on campus on either WCMC or WCMCGuest wireless, or remotely while connected to AnyConnect VPN.
  2. Log in with your WCM credentials
  3. Register the devices you’d like to add to the network. For further instructions on how to register you device read this Knowledge Article: How To: Self-Register IOT devices in dorms in connect to Apollo SSID

Where can I access the Apollo wireless network?

You can access the Apollo wireless network at the following locations:

  • Olin Hall – Residential floors 5 – 10
  • Lasdon Hall – Residential floors 6 – 13
  • Belfer Research Building
  • 1300 York Main campus
  • 570 Lexington Ave – Student Midtown Center

What internet resources can I access on the Apollo wireless network?

The resources available to you on Apollo are similar to what you’d get on a guest network at a coffee shop. Most internet sites will be accessible, as well as, but WCM resources, like fileshare, will not. For those, you’ll need a device that can access the WCM network.

What is a softphone?

A softphone is a virtual phone that is accessed via a computer. While you are assigned a telephone number, you do not need a physical handset to make or receive calls. All calls can be made through your computer, so long as you have an internet connection and ITS-approved headset.

What happens to my CrashPlan account if I leave WCM?

Upon leaving the institution, CrashPlan users have a 30-day data retention period. We highly recommend finding another data backup solution during this period to ensure your information is protected. 

How do patients consent to be contacted for research?

During Epic MyChart (also known as Connect) eCheck-In, patients are given the opportunity to indicate their preference (Yes, No, or Undecided) and sign a consent form to participate in CCR. Patient preferences are then stored in a secure database.  

Who is eligible for the Consent to be Contacted for Research protocol?

Any patient with a visit at NYP-WCM (including East and Lower Manhattan campuses) and/or NYP-Columbia is eligible for the CCR protocol.  

Can I see the patient’s Consent to be Contacted for Research preference in Epic/MyChart?

No, researchers will not be able to see if a patient has indicated that they are interested in being contacted for research through their chart directly and should contact for more information.   

How can I use the Consent to be Contacted for Research protocol to recruit patients for my study?

The CCR protocol allows researchers to recruit patients who meet your study inclusion criteria and have consented to be contacted for research.  

How do I get started using the Consent to be Contacted for Research protocol?

Investigators interested in using the CCR protocol as one of their research recruitment methods should email with a brief description of their study (incl. IRB protocol number) and patient cohort of interest. The study team will need approval from the Institutional Review Board (IRB) and Protocol Review and Monitoring Committee (PRMC) to use the CCR protocol.  

The study team will then meet with the Research Informatics (RI) team to discuss the project and assess the feasibility of using CCR as one of the recruitment methods. The goals of the consult session are for the study team to better understand the overall CCR workflow and for the RI team to begin drafting a computable phenotype of the study’s inclusion/exclusion criteria. Once the study cohort has been identified, researchers will be givethe list of patients in Epic whom they are able to message to via MyChart. 

Are there fees associated with Consent to be Contacted for Research?

Currently, there are no fees associated with using the CCR protocol.  

IT Glossary

Type an acronym or term you would like a definition for.