CUNY Acceptable Use of Computer Resources Policy View the complete CUNY Acceptable Use of Computer Resources . Related Articles What are some scam employer red-flags? How do I report a suspicious email? How can I spot a phishing email? CUNY Cybersecurity Awareness Training Protecting Yourself Online E-Mail Safety