|CUNYfirst Implementation Timeline at Hunter||CUNYfirst login|
|February 18-27||Instructors must complete Verification of Attendance Rosters (formerly Webattendance) for spring 2014 semester: Instructors should refer to the Quick Guide: Verification of Attendance Roster|
|March 2014||Implementation of the Financial Aid segment.|
|July/August 2014||Implementation of the Admissions segment.|
|Full CUNYfirst implementation timeline at Hunter|
CUNYfirst is a CUNY-wide system that is replacing computer systems in several key areas: Student Administration/Records, Finance, and Human Resources, among others. Hunter is already using several CUNYfirst components:
- Human Resources segment (also known as Human Capital Management or HCM) which allows faculty and staff to view and update their personal information online.
- Campus Solutions (academic matters/student records) segment which allows students to enroll in classes, pay bills online, view their academic and financial information and more. In addition, Campus Solutions allows faculty to view class rosters, verify enrollment, post grades as well as perform other academic functions online.
- Financial Supply Chain (CUNY procurement and purchasing) replaced Hunter's budget, purchasing and accounts payable legacy system FOCIS. The new system serves as the system of record for all State tax-levy purchasing, accounts payable and budgeting transactions.
- To learn more about Campus Solutions (academic matters/student records), click this link.
Faculty and staff:
If you need assistance with CUNYfirst, visit the Get Help section of this website.
|We ask that you never share your CUNYfirst login information - not even with people you trust. Because CUNYfirst is a "fully integrated system," sharing your account login information will give others access to personal information, such as your social security number, wage/salary, home address, etc. Security within CUNYfirst is very strict and what each user is able to view is determined on a "need to know" basis. Sharing account information undermines this strict security and exposes users to identity theft.|