Account Application

Current Students: You will always have the same Khoury account between semesters. If you have acquired a Khoury account for either class or work-use in the past, please try account recovery first.

New Students: Accounts will be created once the semester starts, please wait until then to apply.

Warning: Account requests with incorrect or in-use NUIDs will be discarded!


Contact Information
Also known as; given name, personal name
Also known as; family name, surname
Re-type your Email Address
Account Information
Your desired login name (no periods!), please choose wisely because you will not be able to change this after your account is created. A mail forward will also be created with this account so think carefully as you may put this on your resume.
Relationship with College
Your NUID is used to validate your enrollment status and an account will not be created if the wrong NUID is given.
Acceptable Usage Policy

Access to the computer systems and networks owned or operated by the Khoury College of Computer Sciences imposes certain responsibilities and obligations, and is granted subject to University policies, as well as local, state, and federal laws. The University’s Acceptable Use Policy may be found at:

https://khoury.northeastern.edu/systems/policies/

Appropriate use of these resources is always ethical, reflects academic honesty, and shows restraint in the consumption of shared resources. It demonstrates respect for intellectual property, system security, and individuals' rights to privacy and to freedom from intimidation and harassment.

Making appropriate use of the resources means:

  • Using resources only for authorized purposes
  • Protecting your computer account from unauthorized use. You are responsible and will be held accountable for all activities in your account.
  • Accessing only files, data, and network resources that are your own, that are explicitly publicly available, or to which you have been given authorized access
  • Using only legal versions of copyrighted software
  • Being considerate in your use of shared resources, including but not limited to disk space, CPU cycles, network bandwidth, and printer paper

In making appropriate use of the resources, you must not:

  • Use another person's account
  • Attempt to decode passwords or exploit possible security holes
  • Engage in any activity that might be harmful to the systems or the data stored on them, or other computers that are connected to them, such as propagating viruses, removing systems files, or disrupting services
  • Use the College’s systems for personal material gain
  • Do anything that violates the above guidelines

The College considers any violation of appropriate use principles or guidelines to be a serious offense and reserves the right to copy and examine any files or information resident on College systems. Violators are subject to having their account disabled and/or disciplinary action as prescribed in the honor codes and the student and employee handbooks. Further, violations of some of the rules is a violation of state or federal law, and may be punished according to those laws.

Remember that the College provides these resources solely for coursework and research, and makes no guarantees about their availability. Using them is a privilege, not a right.


Note: Account portal emails may be routed to the junk/spam mail folder of your email provider.