How do I set up my voicemail to go to my WCM email account?

To set up your voicemail messages so they are delivered to your phone, visit myvoicemail.weill.cornell.edu, log in with your 5-digit extension and password, and check your settings. You can also place a ticket with the Service Desk.

 

How do I retrieve voicemail when I am away from my desk?

When you miss a call and receive a voicemail, your new phone will automatically deliver the voicemail to your WCMC email account. The email will include an attached .wav audio file of the voicemail message. Additionally, you can call 646-962-6800 from any phone and use your 5-digit extension and password to retrieve your voicemail.

Can I log into another person's phone?

Yes. All Avaya phones allow you to log into another user's phone, which is a feature known as Guest Login. This is particularly useful if you have rotating staff using the same desk phone. To log into another phone, push the Home button, select Guest Login on the screen, and use your 5-digit extension and password to log in. By default, Guest Login will expire after 10 hours.

How do I log into a phone?

By default, your extension should be appearing on your own phone’s login screen. However, if you see a message stating "Enter Extension and press Enter or OK," use your 5-digit extension as your username and password to log in.

Whole Disk Encryption

Data loss is a growing problem in the healthcare industry. Sites such as HealthcareInfoSecurity regularly publish news headlines about data breaches, and patient-related breaches are chronicled on Health and Human Services' "Wall of Shame" for institutions that have suffered breaches affecting 500 or more patients.

Screensaver Frequently Asked Questions

WCM is implementing a screensaver with a security feature that requires you to enter your password in order to resume use of the computer once the screensaver activates in order to comply with requirements for good security practices. Below are some frequently asked questions that deal with this topic.

Lock Your Desktop When You're Away

Why Should You Lock Your Desktop?

If you walk away from your computer and do not lock it or log off, it poses a security risk to you and the college. Someone can use your computer in an unauthorized way even if you are away for a few minutes, such as:

HIPAA and PHI

What is HIPAA?

HIPAA is the acronym for the Health Insurance Portability and Accountability Act that was passed by Congress in 1996.  HIPAA does the following:

Internet Safety and Fraud Protection

What is Internet Fraud?

Internet fraud is a serious problem that you will face both at work and at home. Criminals use a variety of methods to try and obtain sensitive information such as your CWID and password, Social Security Number, and credit card information, which can then be used to cause data breaches and perpetrate identity theft and other nefarious and illegal behavior. 

Peer-to-Peer and File Sharing Overview

What is Peer-to-Peer File Sharing?

Peer-to-peer (P2P) file sharing allows users to make files available for other users to download and use. When installed your computer, file sharing software enables others to download the user’s files onto their own computers.