Email Guidelines
Forgot password:
If you forgot your email id/password please write to itdept[At]iimidr.ac.in with your complete details.
Choose a strong password
Longer passwords are more secure than shorter ones because there are more characters to guess, so consider using passphrases when you can. For example, “Thispasswdis4myEmail!” would be a strong password because it has many characters and includes lowercase and capital letters, numbers, and special characters. You may need to try different variations of a passphrase many applications limit the length of passwords, and some do not accept spaces. Avoid common phrases, famous quotations, and song lyrics.
Don’t assume that now that you’ve developed a strong password you should use it for every system or program you log into. If an attacker does guess it, he would have access to all of your accounts. You should use these techniques to develop unique passwords for each of your accounts.
Here is a review of tactics to use when choosing a password:
- Don’t use passwords that are based on personal information that can be easily accessed or guessed
- Don’t use words that can be found in any dictionary of any language.
- Develop a mnemonic for remembering complex passwords
- Use both lowercase and capital letters
- Use a combination of letters, numbers, and special characters
- Use passphrases when you can
- Use different passwords on different systems
- Use a Password which is difficult to guess
Important tips about password
You have to make sure not to leave it someplace for people to find. Writing it down and leaving it in your desk, next to your computer, or, worse, taped to your computer, is just making it easy for someone who has physical access to your office. Don’t tell anyone your passwords, and watch for attackers trying to trick you through phone calls or email messages requesting that you reveal your passwords, make a habit to change your password from time to time.
Also, many programs offer the option of “remembering” your password, but these programs have varying degrees of security protecting that information. Some programs, such as email clients, store the information in clear text in a file on your computer. This means that anyone with access to your computer can discover all of your passwords and can gain access to your information. For this reason, always remember to log out when you are using a public computer (at the library, an internet cafe, or even a shared computer at your office). Other programs, such as Apple’s Keychain and Palm’s Secure Desktop, use strong encryption to protect the information. These types of programs may be viable options for managing your passwords if you find you have too many to remember.
There’s no guarantee that these techniques will prevent an attacker from learning your password, but they will make it more difficult.
Two step authentication for email
You may also use the Gmail feature to use two step authentications for email. Please follow the steps to enable this.
Logon on your web based email account and Click on mail settings accounts 2 step verification
Follow the online instruction to register your mobile number. This will enhance the security of your email account.
To review or change your 2-step verification settings, visit:
https://www.google.com/accounts/SmsAuthConfig
To learn more about 2-step verification, visit:
http://www.google.com/support/accounts/bin/answer.py?answer=180744
If you have questions about how 2-step verification works or want information about additional
steps to keep your account secure, you can learn more at the Help Center:
http://www.google.com/support/accounts/bin/answer.py?answer=180744&hl=en
Addendum of Email Policy from 01 December 2021
- Due to storage restriction from Gmail, Now onwards, all Alumni email accounts would have maximum 5 GB disk storage which includes email, Google drive and photo storage.
- Users may check their storage status on https://drive.google.com/settings/storage . Every email user must adhere to the Gmail email policy and Institute’s IT usage policy. Any unauthorized material like pornographic content, unsanctioned copyrights contents like books, videos, software, etc., must not be stored or shared in the institute’s email and Google drive. The user will be fully responsible for any violation of the policy.
- Any inactive email account for more than 1 year will be identified and notice must be sent to them whether they are interested to continue the email account. If their interest reply doesn’t come within seven days of the notice, then this type of accounts must be closed. This action is required to avoid any misuse of inactive accounts.
- Email password will be expired in every 90 days. User must change their password accordingly.
- You may use Google Takeout services to transfer/download your existing data (email/Google Drive) from @iimidr.ac.in account.
Transfer your content – https://takeout.google.com/transfer
Download your content – https://takeout.google.com