To get started with ONID, it is recommended you read through the Acceptable Use Policy, as this is the contract you agree with when creating an ONID account. You can also view the ONID Frequently Asked Questions or browse any of the ONID related pages on this site for more information.
After you complete those steps, you ONID account will have been created and you will immediately be able to use your ONID account to:
ONID Sign-Up Instructions
Before You Sign Up
How Do I Set Up My ONID
Finished Signing Up
Trouble Signing Up
Before you sign up:
- Make sure you are eligible for an ONID account. (link opens in a new window)
- Make sure that you know your OSU ID?.
- Students - Your OSU ID number was emailed to you by the OSU Admissions Office after your OSU application was submitted. It was also mailed to you in your acceptance packet from OSU or was given to you in your hiring paperwork.
- Employees - Your OSU ID number is provided a number of ways. The number is located on your ID card, delivered by your supervisor or through a new hire e-mail.
- Get a piece of paper so you can write down your account information (your username, e-mail address, web site, etc).
- If you've done the above, you're ready to go
How Do I Set Up My ONID (OSU Network ID) Account?
- To activate your ONID account, you need to go to:
To verify your identity by entering your:
- OSU ID Number
- Birth date
- First Name
- Last Name
Then click Submit.
- Read OSU's Acceptable Use of Computing Resources Policy, and click "I Agree"
- Set A Password:
- Read the instructions and create a password that meets the restrictions.
- Enter your password a second time.
- Click Set Password.
- Enter Alternate Contact Information:
- Enter your cell phone number.
- Enter an alternate email address.
- Click Submit.
- This information will be used to contact your in the event that you forget your ONID password.
- You are NOT required to enter in information if you do not want to, but it may cause resetting a forgotten password much more difficult.
- You ARE allowed to fill out only one field.
- These CAN be changed later.
- Configure Junk Email Options:
- Verify that the default options are set.
- Adjust them according to your preference.
- Click Set Spam Blocking Options.
- ONID Account Successfully Created
- Your ONID account should have been successfully created.
Finished signing up for an account? Want to learn more?
ONID FAQ - Questions and Answers that you may have.
Using your ONID - Services provided for ONID users.
ONID E-mail - Read your email how you want.
Trouble signing up for an account?
Please note if you are a new student and have just registered for classes you may need to wait up to 6 hours for the registration system to update ONID before you can sign up for your ONID account. Updates occur at 2AM, 8AM, 2PM, and 8PM Pacific Time.
Your new hire paperwork must be processed by Human Resources before you are eligible for an ONID account.
Acceptable Use Policy
OSU GEN: Acceptable Use of University Computing Resources
General University Policies Manual
Oregon State University supports an environment of learning and sharing of information through the acquisition and maintenance of computers, computer systems, networks, and associated computing resources and infrastructure. University computing resources are intended to support the University's missions, administrative operations and activities, student and campus life activities, and the free exchange? of ideas and information between the University and the greater community in which it operates locally, nationally, and internationally.
Computing resources and facilities of Oregon State University are the property of the University and shall be used for legitimate University instructional, research, administrative, public service, and approved contract purposes. Personal use of computing resources may be permitted if it does not interfere with the University's or the employee's ability to carry out University business, and does not violate the terms of this policy. The use of University computing resources is subject to the generally accepted tenets of legal and ethical behavior within the University community. The computing resources system shall not be used for material or activities that reasonably could be considered harassing, obscene, or threatening by the recipient or another viewer.
This policy applies to all users of university computing resources, whether affiliated with the University or not, and to all use of those resources, whether on campus or from remote locations. Additional policies may apply to computing resources provided or operated by individual units of the University or to uses within specific units.
- All users of University computing resources must: Comply with all federal, state and other applicable laws; all generally applicable Board of Higher Education and University rules and policies; and all applicable contracts and licenses. Users are responsible for ascertaining, understanding, and complying with the laws, rules, policies, contracts, and licenses applicable to their particular uses.
- Use only those computing resources that they are authorized to use and use them only in the manner and to the extent authorized. Accounts and passwords may not, under any circumstances, be shared with or used by persons other than the individual(s) to whom they have been assigned by the University.
- Refrain from unauthorized attempts to circumvent the security mechanisms of any University system.
- Refrain from attempts to degrade system performance or capability, or attempts to damage systems, software or intellectual property of others.
- Refrain from using University computing resources for commercial purposes, except as specifically authorized by the University in written approval of a request for approval of outside employment. Any such approval shall include full detail of the employee's financial obligation and the charge for such use, if any.
- When using University computing resources to access non-University resources, observe the acceptable use policies of those non-University organizations.
- Refrain from unauthorized viewing or use of another person's computer files, programs, accounts, and data.
- Refrain from sharing a password or using another person's password. All such activity is strictly prohibited. Access to such information does not imply permission to view or use it. Users are responsible for ascertaining what authorizations are necessary and for obtaining them before proceeding.
- Refrain from using electronic mail systems for "broadcasting" of unsolicited mail or for any purpose prohibited by state or federal laws. Broadcast email is defined in "Guidelines for Release of Email Addresses," available at http://oregonstate.edu/registrar/guidelines-release-e-mail-addresses
- Abide by federal copyright laws when using University computing resources for the use of or the copying of copyrighted material. The unauthorized publishing or use of copyrighted material on a University server is prohibited and users are personally liable for the consequences of such unauthorized use.
- Abide by his/her supervisor's direction regarding personal use of University computing resources.
Users should be aware that their uses of University computing resources are not completely private. It is the policy of the University not to monitor individual usage of computing resources.
However, the University reserves the right to monitor and record the usage of all computing resources as necessary to evaluate and maintain system efficiency, and may further monitor and record the usage of individuals, including the disclosure of individual files:
- if it has reason to believe that activities are taking place contrary to this policy, or to Oregon University System policy, or state or federal law or policy
- to respond to an administrative court or judicial court order
- to respond to a request for discovery in the course of litigation
- to respond to a public record request for files which are deemed public records under public records laws
The University may use information gained in this manner in disciplinary or criminal proceedings. In addition, state or federal law may require disclosure of individual computer files that are deemed public records under public records laws. Communications made by means of University computing resources are also generally subject to Oregon's Public Records law to the same extent as they would be if made on paper.
Users who violate this policy may be denied access to University computing resources and may be subject to disciplinary actions and/or criminal and civil penalties. Violations will normally be handled through the University disciplinary procedures applicable to the relevant user and may include referring suspected violations of applicable law to appropriate law enforcement agencies. However, the University may immediately suspend or block access to an account, prior to the initiation or completion of such procedures, when it appears necessary to do so in order to protect the integrity, security or functionality of University or other computing resources or to protect the University from liability.
This policy is the University's complete acceptable use policy and replaces the Department of Administrative Services Statewide IT Policy 1.3, Acceptable Use of Information Related Technology.