°ÄÃÅÁùºÏ²ÊÂÛ̳

Account and Email

Account Management and Email

Students, faculty, and staff are provided with °ÄÃÅÁùºÏ²ÊÂÛ̳ email and Office 365 accounts. These accounts also provide access to  tools for document management, storage, and collaboration online. In addition, your °ÄÃÅÁùºÏ²ÊÂÛ̳ email will help you to stay on top of campus news and events, as well as connect with faculty and students. Check your University email regularly for all official °ÄÃÅÁùºÏ²ÊÂÛ̳ correspondence.

Your °ÄÃÅÁùºÏ²ÊÂÛ̳ Account

Your University Account grants you access to ,Ìý, SelfService, the , and other campus services. Please view the  for more information on your account and account security features.

You should never share your password with anyone, and °ÄÃÅÁùºÏ²ÊÂÛ̳ IT will never ask you for your password.

Learn more about securing your account with

Account Activation

To activate your °ÄÃÅÁùºÏ²ÊÂÛ̳ account use Microsoft’s .

You will need to know your University Email and have access to your secondary authentication factors. IT Support Services staff can assist. They are in the lower level of Caroline Hall and can be reached at IT@northpark.edu or (773) 244-5540.

Account Activation

To activate your °ÄÃÅÁùºÏ²ÊÂÛ̳ email and Office 365 account, use Microsoft’s .

You will need to know your University Email and have access to your secondary authentication factors. IT Support Services staff can assist. They are in the lower level of Caroline Hall and can be reached at IT@northpark.edu or (773) 244-5540.

Password Reset

If you no longer remember your password, use Microsoft’s self-service . You will need to have access to your secondary authentication factors.

Password Change

If you know your password but want to change it, log into  and choose the Change Password option.

Check Your Email

You should check your University email regularly to stay on top of important academic and campus life information. All official °ÄÃÅÁùºÏ²ÊÂÛ̳ correspondence will be sent to your University email account. The  has instructions on syncing your devices with your email as well as email-forwarding rules. There is also information on a variety of .

Guiding Principles

The network provides the ability to connect to millions of people and resources. It is very important for each user to recognize his or her responsibility when using this connection. Each user is directly responsible for his or her actions while accessing the network. Users must always remember that just because something can be done, does not mean that it should be done.

The °ÄÃÅÁùºÏ²ÊÂÛ̳ computing resources and network are for the use of current °ÄÃÅÁùºÏ²ÊÂÛ̳ faculty, students, and staff, and are to be used primarily for the academic, administrative, educational, and research purposes of the institution. Occasional non-institutional use is permitted if (i) the use is not excessive, (ii) does not interfere with the performance of any faculty, staff member, or student’s duties, (iii) does not interfere with the efficient operation of the °ÄÃÅÁùºÏ²ÊÂÛ̳ network or its computing resources, (iv) is not otherwise prohibited by this policy or any other °ÄÃÅÁùºÏ²ÊÂÛ̳ policy or directive, and (v) is not otherwise prohibited by law.

Understand that °ÄÃÅÁùºÏ²ÊÂÛ̳ is a Christian community. Your activities must reflect that when utilizing our resources.

Specific prohibitions (not meant to be all-inclusive):

  • Sending confidential information without encryption. Un-encrypted information can be easily read and re-transmitted.
  • Downloading, keeping, sending, publishing, posting anything that could be considered offensive, vulgar or harassing by °ÄÃÅÁùºÏ²ÊÂÛ̳ Standards.
  • Sending of unsolicited email messages to groups of people.
  • Tampering with any electronic or computer system that you do not own.
  • Actions likely to result in the loss or disruption of another’s work.
  • Accessing or attempting to access information that does not belong to you or to which you do not have legitimate permission to access.
  • Sharing your password with anyone.
  • Using our resources for any illegal, immoral, or unethical activity.
  • Storing of information deemed protected by government regulations on non-°ÄÃÅÁùºÏ²ÊÂÛ̳-owned computers.
  • Sharing of information deemed protected by government regulations to unauthorized parties.

Choose passwords that cannot be easily guessed. They protect your personal information and that of others.

°ÄÃÅÁùºÏ²ÊÂÛ̳ expressly reserves the right to inspect and examine any °ÄÃÅÁùºÏ²ÊÂÛ̳ owned or operated computer system, computing resource, and/or file(s) or information contained therein at any time. This includes email communications stored on our servers and information traveling over our networks.

If you encounter problems with °ÄÃÅÁùºÏ²ÊÂÛ̳’s computers, please report them by opening a , or calling Information Technology.

File Sharing

°ÄÃÅÁùºÏ²ÊÂÛ̳ expects our campus community to be aware of current laws and applicable University policies with respect to computer, network, and internet use. It should be noted that it is illegal to use the °ÄÃÅÁùºÏ²ÊÂÛ̳ network to use file-sharing programs for copyrighted material. Industry organizations have filed copyright infringement lawsuits against individual college students who have used file-sharing programs to share copyrighted information. Violation of copyright laws can have serious consequences in both the areas of civil and criminal liability. °ÄÃÅÁùºÏ²ÊÂÛ̳ advises students not to engage in peer-to-peer file sharing. We have technology in place to prevent this type of traffic, and there are many alternatives to illegal peer-to-peer file sharing.

Disciplinary Actions

The use of °ÄÃÅÁùºÏ²ÊÂÛ̳’s technology is a privilege, not a right. Abuse of any of the equipment or violation of any of the above stated rules may result in a loss of computing privileges or campus disciplinary procedures through the office of the Dean of Students, or Director of Human Resources.