A brief description of the University's information and technology-related policies are listed below.
Information Security Policy
This policy provides principles for protecting information in a manner that is consistent with its requirements for confidentiality, integrity and availability wherever it is located across the University.
Access to Accounts
The University has the legal right to access, preserve, and review all information stored on or transmitted through its IT Systems. This policy outlines the procedure for access.
Computer and Endpoint Security Requirements
This policy states that all computers and other endpoints that connect to Princeton’s secure network must comply with the requirements of the University’s cybersecurity protocols.
Generative AI Tools Use
This policy outlines the appropriate use of University administrative and operational information with generative AI tools.
Data Center Policy
This policy provides guidance for users and visitors to University data centers.
Domain Name Policy
This policy establishes requirements and processes for requesting, obtaining, and selecting domain names.
Software Retention
This policy was created in order to manage the support of software that is made available through OIT products.
Acceptable Use Policy
Defines the general rules of conduct for members of the University community when using the University's technology resources. It provides clear examples of acceptable and unacceptable behavior, and details the range of penalties for violations of University regulations and policy.
Rights, Rules and Responsibilities
A concise reference and guide for all members of the Princeton University community. This document includes brief statements of University policies that are most likely to be applicable to and of interest to all University constituencies, including policies applicable to information technology use.