Skip to McMaster Navigation Skip to Site Navigation Skip to main content
McMaster logo

Office of the AVP & CTO

INFORMATION TECHNOLOGY SECURITY

Students

Information Security is a core element of good digital citizenship.

As a student you benefit from access to many resources provided by the University, including internet access, computer labs, and library resources. It is up to you to use all of these resources responsibly, and to respect the rights of other students to access the same resources. The Information Security Policy helps you to understand these responsibilities, and to take positive steps towards protecting your personal information and becoming a good digital citizen.

Expandable List

Choose a strong password for your MacID credentials, and keep it protected!

A good password is one that is easy for you to remember, but difficult to guess. MacID passwords must be at least 8 characters long (we recommend 12), and use a mix of letters, numbers and symbols.

When you share your MacID password you’re not just letting a friend get onto WiFi or download some content from the library, you’re giving them access to your full student records, personal information, emails, and more. Protect your MacID password and keep your information secure.

Protect yourself from malicious software.

Modern malware is pervasive and ubiquitous on the internet, and has the potential to seriously disrupt your studies. As a student you’re busy enough, you don’t need to worry about losing your work to a ransomware attack, or losing your identity.

Choose an antivirus product that you trust, and run periodic scans of all of your files. Keep all of your software up to date, and install browser based security plugins. Most of all, practice safe browsing!

Responsible Access to Resources

Information Security is a shared responsibility

We all play a role in ensuring that University technology resources are protected and available to everyone in the McMaster community.

Respect the rights of other to access resources, and don’t abuse the resources to which you have access. When you send disruptive emails, or tie up workstations by downloading music or movies, or use our shared resources in an irresponsible way, you are preventing others from studying, working, and teaching.