The security of information is of the utmost importance to the SUNY Cortland. Faculty, Staff, Students, Guests, Contractors, and Vendors - all have a part to play in safeguarding our data and computer systems.
The primary focus points of Information Security Programs at SUNY Cortland are:
The SUNY NY-Alert system is designed to alert you in cases where your personal safety may be at risk. For this reason it is critical that we provide the SUNY NY-Alert system with your email address and cell phone number for text messaging.
How to Submit Your Emergency Contact Information Through Self-Service
Go into myRedDragon
Select the Faculty/Staff Tab
Under Important Links, select HR Services/TAS
Under Self Service, select SUNYHR Self Service
Enter your Date of Birth for verification
You should now see your Human Resource Record
Now select the Phone Tab
The numbers listed here will be the numbers that will be sent to SUNY NY-Alert
a. The only numbers going to SUNY NY-Alert will be Cell, Other, and Work Phone 2
To update a phone record, under select click on the radio button of the phone you wish to update, then select Add, to add a new number or Update to update an existing number
Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer.Read more about Phishing...
All SUNY Cortland’s data must be classified into one of the three categories and protected using appropriate security measures consistent with the minimum standards for the classification level as described in related information security standards, procedures, and guidelines. Read More about Data Classification ...
Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer.
Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. Learn how to identify a scam, view reported scams, and report a phishing scam.