Note: This is the 2022–2023 eCalendar. Update the year in your browser's URL bar for the most recent version of this page, or .
Information Technology (IT) Policies and Regulations
ƽÌØÎå²»ÖÐ students, faculty, staff, and other members of the ƽÌØÎå²»ÖÐ community benefit from a variety of Information Technology resources, which are used in accordance with University policies and directives. Visit the IT policies site for further details.
Here are some key references for students :
Responsible Use of ƽÌØÎå²»ÖÐ Information Technology Resources
Responsible Use of ƽÌØÎå²»ÖÐ Information Technology Resources
Each of us has responsibilities when using ƽÌØÎå²»ÖÐ's IT resources. The Policy on the Responsible Use of ƽÌØÎå²»ÖÐ Information Technology Resources is a code of conduct that identifies what is acceptable when working with ƽÌØÎå²»ÖÐ technology resources.
For more information, view the Policy on the Responsible Use of ƽÌØÎå²»ÖÐ Information Technology Resources, available on the Secretariat website.
Report Security Incidents
Report Security Incidents
Please inform IT Services immediately if you experience or are aware of an IT security incident!
For more information, please refer to the IT Security Incident Response Protocol.
Use of Cloud Services
Use of Cloud Services
ƽÌØÎå²»ÖÐ's Cloud Directive governs your usage of cloud services—programs and apps delivered over the Internet. ƽÌØÎå²»ÖÐ has approved cloud apps and solutions that are available for your use while at ƽÌØÎå²»ÖÐ. However, you'll need to choose your apps wisely as not all apps are safe, and they won't all adequately protect sensitive data (either your own or ƽÌØÎå²»ÖÐ's).
To learn how to safely use cloud apps and solutions, please refer to our Cloud Services Page.
Two-Factor Authentication (2FA)
Two-Factor Authentication (2FA)
All student, faculty, and staff accounts are protected with two-factor authentication (2FA), an additional security measure that requires a secondary method of authentication (e.g., acknowledging a prompt or entering a code sent to your mobile device via a mobile app) when signing into many ƽÌØÎå²»ÖÐ systems. 2FA makes it much harder for cybercriminals to access your account and your personal information, even if they obtain your password. 2FA is required for all higher education institutions in Canada.
Find out more about 2FA at mcgill.ca/2fa.
Email Communication
Email Communication
All students are assigned a ƽÌØÎå²»ÖÐ email address (usually in the form of firstname.lastname@mail.mcgill.ca) and are given a ƽÌØÎå²»ÖÐ email mailbox. It is your responsibility to monitor your ƽÌØÎå²»ÖÐ email regularly because this is the official means of communication between ƽÌØÎå²»ÖÐ and its students. Ensure that you read and act upon the emails in a timely fashion.
To access your ƽÌØÎå²»ÖÐ email, go to the Microsoft Office website and sign in with your ƽÌØÎå²»ÖÐ username and password.
If you have another email account using an external service provider (such as Gmail, Hotmail, Yahoo, etc.), please review the "" article on the IT Knowledge Base.
For more information, visit the Policy on E-mail Communication with Students, available on the Secretariat website.
Secure your Journey
Secure your Journey
IT policies and directives identify measures required to ensure the security and integrity of data and systems you use throughout your student journey. Find out about best practices and cybersecurity steps you can take at mcgill.ca/cybersafe.