Skip to main content

Recent Updates Fordham campuses remain physically closed per New York Pause, but all offices are staffed and operating remotely. Full Details

Hosting Policy

Version 1.1


The purpose of this policy is to define hosting rules for content distribution on the University’s IT Resources by Users or authorized third parties.


This IT policy, and all policies referenced herein, shall apply to all members of the University community including faculty, students, administrative officials, staff, alumni, authorized guests, delegates, and independent contractors (the “User(s)” or “you”) who use, access, or otherwise employ, locally or remotely, the University’s IT Resources, whether individually controlled, shared, stand-alone, or networked.

Policy Statement

  • Hosting of content distribution sites for entities other than University units, University affiliates, or registered student organizations (e.g., professional associations, consortiums, or journals) may be provided on University-managed servers only when the entity has a relationship with the University that supports the University’s teaching, research, or service mission. 
  • Such a relationship may be demonstrated when the University has or enters into an authorized contractual relationship for hosting the entity’s site.


Hosting is providing network access to a site, or network accessible location, which provides distribution of content.

IT Resources include computing, networking, communications, application, and telecommunications systems, infrastructure, hardware, software, data, databases, personnel, procedures, physical facilities, cloud-based vendors, Software as a Service (SaaS) vendors, and any related materials and services.

Related Policies and Procedures

Implementation Information

Review Frequency: Annual
Responsible Person: Director, IT Risk and Data Integrity
Approved By: Office of Legal Counsel
Approval Date: May 13, 2019

Revision History

Version: Date: Description:
1.0   While this policy is “new,” this policy was formerly in the IT Policy: Acceptable Uses of IT Infrastructure and Resources. Prior revisions to this policy found in that document.
1.1 05/13/2019 Updated policy statement

Policy Disclaimer Statement

Deviations from policies, procedures, or guidelines published and approved by the University Information Security Office (UISO) may only be done cooperatively between the UISO and the requesting entity with sufficient time to allow for appropriate risk analysis, documentation, and possible presentation to authorized University representatives. Willful failure to adhere to UISO written policies may be met with University sanctions.