Search4 Results

Learn Mount Holyoke College's procedures for collecting, storing/securing, sharing/accessing, and disposing/destroying data.
Keep the College's data and network secure!
An introduction to 2-step verification and instructions for enrolling your MHC Account in Google 2-step verification.
A description of what Phishing is and how to report it at MHC.