Search4 Results

Keep the College's data and network secure!
Learn Mount Holyoke College's procedures for collecting, storing/securing, sharing/accessing, and disposing/destroying data.
An introduction to 2-step verification and instructions for enrolling your MHC Account in Google 2-step verification.
A description of what Phishing is and how to report it at MHC.