- Knowledge Base
- Information Security
- Data Handling Procedures
Learn Mount Holyoke College's procedures for collecting, storing/securing, sharing/accessing, and disposing/destroying data.
- Knowledge Base
- Information Security
Keep the College's data and network secure!
- Knowledge Base
- Accounts, Passwords, & OneCard
- Passwords & 2-step/MFA
An introduction to 2-step verification and instructions for enrolling your MHC Account in Google 2-step verification.
- Knowledge Base
- Information Security
A description of what Phishing is and how to report it at MHC.