Non-Core Google Services Policy
This policy governs the relationship between the User and Google for the use of Non-Core Google Services.
This IT policy, and all policies referenced herein, shall apply to all members of the University community including faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.
- Users of non-core Google Services will be recognized as being affiliated with Fordham University when using their Fordham email address.
- Users should be aware that while using non-core Google Services, they are not covered by the pre-negotiated relationship between the University and Google; therefore, they enter into a private agreement between themselves and Google when using any Google app that is not defined as a Core Google Service with their Fordham Gmail account.
- Users are not covered by the same protections as they would be if using Fordham’s Google Core Services.
- The University disclaims any liability for the use of these services, regardless of the type of action brought against the User. While Fordham does not regulate the use of non-core Google Services by members of the Fordham Community, the sharing, posting, storage, or disclosure of any Fordham Protected or Fordham Sensitive data, including those offered by Google or any other non-University venue, is strictly prohibited.
 The University has an agreement with Google for Gmail™, Calendar, Drive, Sites, and Groups known as Core Google Services. Refer to the Core Google Services Policy for more details
Related Policies and Procedures
- Acceptable Uses of IT Infrastructure and Resources
- Core Google Services Policy
- Data Classification Policy
|Responsible Person:||Director, IT Risk and Data Integrity|
|September 18, 2018|
Policy Disclaimer Statement
Deviations from policies, procedures, or guidelines published and approved by the University Information Security Office (UISO) may only be done cooperatively between the UISO and the requesting entity with sufficient time to allow for appropriate risk analysis, documentation, and possible presentation to authorized University representatives. Willful failure to adhere to UISO written policies may be met with University sanctions.