Skip to main content

Non-Core Google Services Policy

Version 1.0

Purpose

This policy governs the relationship between the User and Google for the use of Non-Core Google Services.

Scope

This IT policy, and all policies referenced herein, shall apply to all members of the University community including faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.

Policy Statement

  • Users of non-core Google Services[1] will be recognized as being affiliated with Fordham University when using their Fordham email address.
    • Users should be aware that while using non-core Google Services, they are not covered by the pre-negotiated relationship between the University and Google; therefore, they enter into a private agreement between themselves and Google when using any Google app that is not defined as a Core Google Service with their Fordham Gmail account.
    • Users are not covered by the same protections as they would be if using Fordham’s Google Core Services.
  • The University disclaims any liability for the use of these services, regardless of the type of action brought against the User. While Fordham does not regulate the use of non-core Google Services by members of the Fordham Community, the sharing, posting, storage, or disclosure of any Fordham Protected or Fordham Sensitive data, including those offered by Google or any other non-University venue, is strictly prohibited.

[1] The University has an agreement with Google for Gmail™, Calendar, Drive, Sites, and Groups known as Core Google Services. Refer to the Core Google Services Policy for more details

Related Policies and Procedures

Implementation Information

Review Frequency: Annual
Responsible Person: Director, IT Risk and Data Integrity
Approved By: CISO
Approval Date:
September 18, 2018

Revision History

Version:
Date: Description: 1.0 09/18/2018 Final

Policy Disclaimer Statement

Deviations from policies, procedures, or guidelines published and approved by the University Information Security Office (UISO) may only be done cooperatively between the UISO and the requesting entity with sufficient time to allow for appropriate risk analysis, documentation, and possible presentation to authorized University representatives. Willful failure to adhere to UISO written policies may be met with University sanctions.