Carnegie Mellon University

File Storage and Sharing

You are responsible for the content and actions of your computer. Follow these Computing Services recommendations for safe private storage and file sharing.

IMPORTANT: If you use built-in OS file sharing, or peer-to-peer file sharing applications (for example, BitTorrent), the content of the “shared” folder on your computer may be available to others. This can lead to unauthorized access to your computer, or illegal distribution of copyright protected material, including music and movies. Violation of copyright law can result in disciplinary action or loss of network connectivity.

Be safe...

  • Maintain a secure and strong password to protect your data and the data of the university and its affiliates.
  • Students, consider your downloading habits! If you share a music or movie library, turn off file sharing before you arrive on campus. Otherwise, you could inadvertently share your library with thousands on the campus network, which is a violation of the Computing Policy and may result in a Digital Millennium Copyright Act (DMCA) Notice with possible network suspension.
  • Refer to the ISO Guidelines for Data Classification to determine the best tool for storing your data. 
  • Do not use email to store your files. Instead, use one of the secure file storage services available to you.
  • If you administer an IT service or database, contact Computing Services for assistance with access and group management.

Cloud Computing

The use of cloud services for personal use (for example, Google Apps, Apple iCloud, Dropbox, and SkyDrive) has grown rapidly. When you create personal accounts for cloud services, follow these guidelines to ensure that your data and university identity are protected.

Be safe...

  • Do not use your Andrew password or Andrew email address cloud services for personal use. Instead, use a separate email with a strong password.
  • Use caution when storing sensitive data in the cloud. For example, avoid storing Personally Identifiable Information (PII) such as Social Security Numbers, driver license numbers, and health insurance and credit card numbers.
  • Know the security and privacy features of the cloud services you use most frequently.
  • Read the “Terms of Use” agreements -- some don't respect the privacy or security of your data.