Email and Calendar

Log in to Office 365

IUP offers an Office 365 email account to students, faculty and staff. The format of your IUP email address is username@iup.edu.

Access to the email account is available by clicking the above button.  There is also an Email button in MyIUP.  Users can directly log into the email account at mail.iup.edu.

General Information

Email is the official communication method of IUP. Information pertaining to the usage of email at IUP can be found under the general information section.

Email

IUP uses Office 365 for our email. Office 365 offers an email quota of 50 GB. It also provides single sign-on integration. You will use your network username/password to access your email.

Calendar

The calendar is integrated into your Office 365 email account. All accounts have this feature built into them. Under the calendar menu, you can find information about your calendar.

Advanced Threat Protection for Email

This email security tool is used to help diminish the risk that IUP email users may fall victim to having their email compromised.

Anti-Spam Service

The anti-spam service in the current IUP email environment will aid in identifying and handling messages that may be spam.

Mailing Lists

Mailing lists are available accounts to faculty, staff, and groups on campus. These mailing lists help facilitate the distribution and reception of messages to large groups of the campus community. Available in this section are all details in regards to mailing lists, including the ability to request a mailing list.

  • Course Section Email List

    • Course Section Email Lists are specialized mailing lists requested by faculty to contact students in the faculty's courses.

Alumni and Retired Email Access

All alumni and retired employees are eligible for email access that is associated with the university. Specific details of the services offered to alumni and retirees can be found in this section.

Phishing

In computing, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. (Source: Wikipedia).

Related Links: