News & Announcements
- How do I change my JHED Login ID?
- How do I change my name?
- How do I change my password?
- How do I change my photo?
- How do I change my quicklinks?
- How do I change my security questions?
- How do I log in for the first time?
- How do I log out?
- How do I reset my password?
- How do I set online visibility?
- How do I update myProfile?
- How do I create an email account?
- How do I create an email alias?
- How do I create an email list?
- How do I create a group email account?
- How do I set spam quarantine options?
Acceptable Use of myJH
myJH is provided solely as an internal communication aid for the members of the Johns Hopkins community, its use for commercial or solicitation purposes of any sort is strictly prohibited. Printed or electronic copies of directory information may not be made in any form in whole or in part and may not be republished or redistributed. Acceptance of the information provided by this online resource carries with it an obligation to observe this condition.
Guidelines for the Acceptable Use of Hopkins IT Computing Resources
These guidelines supplement existing Johns Hopkins policies, agreements, and state and federal laws and regulations. Computing resources include host computer systems, Johns Hopkins sponsored computers and workstations, communications networks, software, and files.
Computing resources are provided to support the academic research, instructional, patient care and administrative objectives of Johns Hopkins. These resources are extended for the sole use of Johns Hopkins faculty, staff, students, affiliates and other authorized users ("users") to accomplish tasks related to the user's status at Johns Hopkins, and consistent with John Hopkins' mission.
Users are responsible for safeguarding their identification (ID) codes and passwords, and for using them for their intended purposes only. Each user is responsible for all transactions made under the authorization of his or her ID, and for all network activity originating from his or her data jack. Users are solely responsible for their personal use of computing resources and are prohibited from representing or implying that the content constitutes the views or policies of the Johns Hopkins.
Violation of these guidelines may constitute unacceptable use of computing resources and/or violate other Johns Hopkins policies, state or federal law. Suspected or known violations should be reported to the appropriate Johns Hopkins computing unit. Violations are processed by the appropriate Johns Hopkins authorities and/or law enforcement agencies. Violations may result in revocation of computing resource privileges, academic dishonesty proceedings, faculty, staff or student disciplinary action, or legal action.
This system may be monitored, according to JH policy. Information gathered through such monitoring may be used by Johns Hopkins for the actions described above.
A complete listing of Information Technology Policies is located at: http://www.it.johnshopkins.edu/policies/