Original Issued: November 3, 2016
Last Updated: September 23, 2025
Last Reviewed: March 12, 2025
Weill Cornell Medicine (WCM) requires a minimum set of security requirements for devices accessing WCM networks, applications, and data or used for WCM purposes. By establishing a minimum set of security requirements, WCM can better manage the risk of an adverse event.
This policy applies to all WCM Workforce Members who utilize WCM information technology resources as well as those responsible for managing and safeguarding WCM data.
All WCM Workforce Members are responsible for protecting the confidentiality, integrity, and availability of information created, received, stored, transmitted, or otherwise used by WCM (hereinafter referred to as “data”), and for WCM activities performed by authorized parties.
All devices used for WCM purposes, regardless of ownership, must meet the minimum security requirements as defined in this policy. Workforce Members are responsible for complying with all ITS policies including mandatory training and attestations.
Workforce Members: Any Faculty; Staff; Students; Volunteers; Trainees; and other persons whose conduct, in the performance of work for WCM, is under the direction and control of WCM, whether or not they are paid by WCM.
For more information on complying with WCM’s minimum device security requirements, reference this page.
Devices owned or issued by WCM must have ITS management and security software installed and properly configured unless an approved and up-to-date variance is on file pursuant to ITS policy 500.20 – Variances.
Workforce Members are responsible for safeguarding WCM data on devices not owned or issued by WCM.
Workforce Members are also responsible for ensuring their devices not owned or issued by WCM meet the minimum security requirements in this policy. If a device is known or suspected of not meeting these minimum security requirements, WCM reserves the right to disconnect the device from the network, prohibit the transfer or storage of WCM data to or from the device, or take any other action as appropriate. If the device is unable to meet the minimum security requirements, individuals must submit a variance request pursuant to ITS policy 500.20 – Variances.
Devices available for public use (such as those in a library, café, or hotel business center), are presumed to not meet this policy's minimum security requirements. They must only be used temporarily for WCM purposes and must never be used to store or process High Risk Data. Workforce Members are responsible for taking appropriate precautions to ensure WCM data is not saved locally or accessible by others on public devices.
Unless an approved and up-to-date variance is on file as described in ITS policy 500.20 – Variances, devices used for WCM purposes must adhere to all of the following minimum security requirements:
All WCM Workforce Members are responsible for adhering to this policy. Failure to comply will be evaluated on a case-by-case basis and could lead to corrective action, up to and including termination, consistent with other relevant WCM and University Policies. Instances of non-compliance that potentially involve a lapse of professionalism may lead to engagement of the Office of Professionalism for evaluation and intervention.
Direct any questions about this policy, ITS-500.10 - Device Minimum Security Requirements, to the Chief Information Security Officer, using one of the methods below:
This policy was reviewed and approved by: