Note: This is the 2022–2023 eCalendar. Update the year in your browser's URL bar for the most recent version of this page, or .
Information Technology (IT) Policies and Regulations
º£½ÇÉçÇø students, faculty, staff, and other members of the º£½ÇÉçÇø community benefit from a variety of Information Technology resources, which are used in accordance with University policies and directives. Visit the IT policies site for further details.
Here are some key references for students :
Responsible Use of º£½ÇÉçÇø Information Technology Resources
Responsible Use of º£½ÇÉçÇø Information Technology Resources
Each of us has responsibilities when using º£½ÇÉçÇø's IT resources. The Policy on the Responsible Use of º£½ÇÉçÇø Information Technology Resources is a code of conduct that identifies what is acceptable when working with º£½ÇÉçÇø technology resources.
For more information, view the Policy on the Responsible Use of º£½ÇÉçÇø Information Technology Resources, available on the Secretariat website.
Report Security Incidents
Report Security Incidents
Please inform IT Services immediately if you experience or are aware of an IT security incident!
For more information, please refer to the IT Security Incident Response Protocol.
Use of Cloud Services
Use of Cloud Services
º£½ÇÉçÇø's Cloud Directive governs your usage of cloud services—programs and apps delivered over the Internet. º£½ÇÉçÇø has approved cloud apps and solutions that are available for your use while at º£½ÇÉçÇø. However, you'll need to choose your apps wisely as not all apps are safe, and they won't all adequately protect sensitive data (either your own or º£½ÇÉçÇø's).
To learn how to safely use cloud apps and solutions, please refer to our Cloud Services Page.
Two-Factor Authentication (2FA)
Two-Factor Authentication (2FA)
All student, faculty, and staff accounts are protected with two-factor authentication (2FA), an additional security measure that requires a secondary method of authentication (e.g., acknowledging a prompt or entering a code sent to your mobile device via a mobile app) when signing into many º£½ÇÉçÇø systems. 2FA makes it much harder for cybercriminals to access your account and your personal information, even if they obtain your password. 2FA is required for all higher education institutions in Canada.
Find out more about 2FA at mcgill.ca/2fa.
Email Communication
Email Communication
All students are assigned a º£½ÇÉçÇø email address (usually in the form of firstname.lastname@mail.mcgill.ca) and are given a º£½ÇÉçÇø email mailbox. It is your responsibility to monitor your º£½ÇÉçÇø email regularly because this is the official means of communication between º£½ÇÉçÇø and its students. Ensure that you read and act upon the emails in a timely fashion.
To access your º£½ÇÉçÇø email, go to the Microsoft Office website and sign in with your º£½ÇÉçÇø username and password.
If you have another email account using an external service provider (such as Gmail, Hotmail, Yahoo, etc.), please review the "" article on the IT Knowledge Base.
For more information, visit the Policy on E-mail Communication with Students, available on the Secretariat website.
Secure your Journey
Secure your Journey
IT policies and directives identify measures required to ensure the security and integrity of data and systems you use throughout your student journey. Find out about best practices and cybersecurity steps you can take at mcgill.ca/cybersafe.