Note: This is the 2022–2023 eCalendar. Update the year in your browser's URL bar for the most recent version of this page, or .
Information Technology (IT) Policies and Regulations
ÎÛÎÛ²ÝÝ®ÊÓƵ University students, faculty, staff, and other members of the ÎÛÎÛ²ÝÝ®ÊÓƵ community benefit from a variety of Information Technology resources, which are used in accordance with University policies and directives. Visit the IT policies site for further details.
Here are some key references for students :
Responsible Use of ÎÛÎÛ²ÝÝ®ÊÓƵ Information Technology Resources
Responsible Use of ÎÛÎÛ²ÝÝ®ÊÓƵ Information Technology Resources
Each of us has responsibilities when using ÎÛÎÛ²ÝÝ®ÊÓƵ's IT resources. The Policy on the Responsible Use of ÎÛÎÛ²ÝÝ®ÊÓƵ Information Technology Resources is a code of conduct that identifies what is acceptable when working with ÎÛÎÛ²ÝÝ®ÊÓƵ technology resources.
For more information, view the Policy on the Responsible Use of ÎÛÎÛ²ÝÝ®ÊÓƵ Information Technology Resources, available on the Secretariat website.
Report Security Incidents
Report Security Incidents
Please inform IT Services immediately if you experience or are aware of an IT security incident!
For more information, please refer to the IT Security Incident Response Protocol.
Use of Cloud Services
Use of Cloud Services
ÎÛÎÛ²ÝÝ®ÊÓƵ's Cloud Directive governs your usage of cloud services—programs and apps delivered over the Internet. ÎÛÎÛ²ÝÝ®ÊÓƵ has approved cloud apps and solutions that are available for your use while at ÎÛÎÛ²ÝÝ®ÊÓƵ. However, you'll need to choose your apps wisely as not all apps are safe, and they won't all adequately protect sensitive data (either your own or ÎÛÎÛ²ÝÝ®ÊÓƵ's).
To learn how to safely use cloud apps and solutions, please refer to our Cloud Services Page.
Two-Factor Authentication (2FA)
Two-Factor Authentication (2FA)
All student, faculty, and staff accounts are protected with two-factor authentication (2FA), an additional security measure that requires a secondary method of authentication (e.g., acknowledging a prompt or entering a code sent to your mobile device via a mobile app) when signing into many ÎÛÎÛ²ÝÝ®ÊÓƵ systems. 2FA makes it much harder for cybercriminals to access your account and your personal information, even if they obtain your password. 2FA is required for all higher education institutions in Canada.
Find out more about 2FA at mcgill.ca/2fa.
Email Communication
Email Communication
All students are assigned a ÎÛÎÛ²ÝÝ®ÊÓƵ email address (usually in the form of firstname.lastname@mail.mcgill.ca) and are given a ÎÛÎÛ²ÝÝ®ÊÓƵ email mailbox. It is your responsibility to monitor your ÎÛÎÛ²ÝÝ®ÊÓƵ email regularly because this is the official means of communication between ÎÛÎÛ²ÝÝ®ÊÓƵ University and its students. Ensure that you read and act upon the emails in a timely fashion.
To access your ÎÛÎÛ²ÝÝ®ÊÓƵ email, go to the Microsoft Office website and sign in with your ÎÛÎÛ²ÝÝ®ÊÓƵ username and password.
If you have another email account using an external service provider (such as Gmail, Hotmail, Yahoo, etc.), please review the "" article on the IT Knowledge Base.
For more information, visit the Policy on E-mail Communication with Students, available on the Secretariat website.
Secure your Journey
Secure your Journey
IT policies and directives identify measures required to ensure the security and integrity of data and systems you use throughout your student journey. Find out about best practices and cybersecurity steps you can take at mcgill.ca/cybersafe.