Student Email

Student Email Accounts
Upon acceptance to Georgia Piedmont Technical College, you will be entered into our database and your student email account will be created. All students now have Windows Live accounts on Microsoft Exchange Labs with 5G of space.

When your account is assigned, a number of responsibilities must be assumed, including knowledge of appropriate college policies and procedures. Please read the email and computer policy information below. By utilizing this account, you agree to abide by GPTC's policies whether you read them or not and will lose your account privileges if you fail to comply.
All uses of college IT resources are subject to applicable rules, policies and procedures of the school, TCSG, and governing boards; as well as Georgia Statutes governing computer fraud, misuse of state equipment resources, public information, and related criminal offenses.

Example: The username for Keith Staple would be kstaple and the email address would be

  1. To access your account through the web, open Internet Explorer and type in the address window then press Enter to access your Office 365 account.

  2. Enter your full email address just as the screenshot below shows .

  3. Enter your password. The initial password will be the same as your initial BannerWeb PIN, not what you may have changed your BannerWeb PIN to be. (This will be the PIN you received for BannerWeb in your letter.) If you are a new student, you should have received a letter containing this information. If you are a current student, you will need to use the PIN that you were originally assigned as a new student. Note: If you don't know original PIN please contact Student Support at 404-297-9522 ext. 5399 for assistance.

  4. You will be prompted to change your password when you first sign in and to set up your security question so you can reset your password should you forget it.

  5. You will also be required to supply some additional information and accept the service agreement. Please read all the information carefully.

Sample sign in screen:

Sample Sign In Screen


Setup Security Questions


  2. Type your user name

  3. Type your email password

  4. Click Continue

  5. Click on Enrollment tab

  6. Select the first question

  7. Type answer twice *Answer has to be at least 5 characters*

  8. Select the second question

  9. Type answer twice *Answer has to be at least 5 characters*

  10. Click Update

  11. Click Sign Out at the top

Change Password
If you are able to log on to the Office 365 email account.


  2. Type your user name

  3. Type your email password

  4. Click Continue

  5. Click on Change Password tab

  6. Type old password

  7. Type new password twice

  8. Click OK

  9. Click Sign Out at the top

If you are unable to log on to the Office 365 email account. *Use after you have setup security questions*


  2. Click on Reset Password (right side of the page)

  3. Type your user name

  4. Click Continue

  5. Answer both of your security questions

  6. Type the characters of the picture in the Characters box

  7. Click Continue

  8. Enter your new password twice

  9. Click Continue

  10. Type the characters of the picture in the Characters box

  11. Click Reset password

  12. Click Sign Out at the top

Additional Assistance
If you are encountering problems or have questions regarding your student e-mail account or use of Secure Shell Software, you may direct your request for technical support in one of two ways:

  1. Send an e-mail clearly stating the problem and your contact information to:

  2. Call the Student Computing and Network Services help line at: (404) 297-9522 Ext. 5399. Hours of operation: 8 AM - 6 PM Monday-Thursday, 8 AM - 2 PM Saturday

Email Policy

This policy, which is effective immediately, applies to all electronic mail systems and services provided or owned by Georgia Piedmont Technical College (GPTC). This includes all users, holders, and uses of electronic mail services as well as all college electronic mail records in the possession of employees or other electronic mail users of said services provided by GPTC.

GPTC recognizes that principles of academic freedom, freedom of speech, and privacy of information hold important implications for electronic mail and electronic mail services. GPTC encourages the use of electronic mail and respects the privacy of users. Those who use these services are expected to do so responsibly in compliance with state and federal laws. They are strongly encouraged to use the same personal and professional courtesies and considerations in electronic mail as they would in other forms of communication.

The confidentiality of electronic mail cannot be assured. GPTC does not routinely inspect, monitor, or disclose electronic mail without the holder's consent. It may, however, deny access to its electronic mail services and may inspect, monitor, or disclose electronic mail when required by and consistent with law, when there is substantiated reason to believe that violations of law or of GPTC policies have taken place, when there are compelling circumstances, or under time-dependent, critical operational circumstances.

Access to GPTC electronic mail services a privilege. Electronic mail systems, services, and electronic mail addresses or accounts associated with GPTC are the property of the college. Students are expected to comply with college requests for copies of electronic mail records in their possession that pertain to the administrative business of the college, or whose disclosure is required to comply with applicable laws, regardless of whether such records reside on a computer housed or owned by the College.

Both GPTC policy and the law prohibit the theft or other abuse of computing resources. Such prohibitions apply to electronic mail services and include unauthorized entry, use, transfer, and tampering with the accounts and files of others, and interference with the work of others and with other computing facilities. GPTC electronic mail services and systems may not be used for unlawful activities, commercial purposes not under the auspices of the college, or for personal financial gain. GPTC electronic mail users shall not give the impression that they are representing, giving opinions, or otherwise making statements on behalf of the college, or any unit of the college, unless appropriately authorized to do so. GPTC electronic mail users shall not employ a false identity. Violators may be prosecuted to the full extent of the law.

College electronic mail services shall not be used for purposes that could reasonably be expected to cause, directly or indirectly, excessive strain on any computing facilities, or unwarranted or unsolicited interference with others' use of electronic mail or electronic mail systems. Such uses include, but are not limited to, the use of electronic mail services to send or forward electronic mail chain letters, "spam," or "letter-bombs." Users should exercise extreme caution in using electronic mail to communicate confidential or sensitive matters.

Users should be aware that, during the performance of their duties, network and computer operations personnel and system administrators need from time to time to observe certain transactional addressing information to ensure proper functioning of college electronic mail services, and on these and other occasions may inadvertently see the contents of electronic mail messages. They are not permitted to see or read the contents intentionally or disclose or otherwise use what they have seen. One exception, however, is that of systems personnel (such as "postmasters") who may need to inspect electronic mail when re-routing or disposing of otherwise undeliverable electronic mail.

GPTC attempts to provide secure and reliable electronic mail services. Operators of college electronic mail services are expected to follow sound professional practices in providing for the security of electronic mail records, data, application programs, and system programs under their jurisdiction. Since such professional practices and protections are not foolproof, however, the security and confidentiality of electronic mail cannot be guaranteed. Furthermore, operators of electronic mail services have no control over the security of electronic mail that has been downloaded to a user's computer. As a deterrent to potential intruders and to misuse of electronic mail, electronic mail users should employ whatever protections (such as passwords) are available to them.

Users of electronic mail services should be aware that even though the sender and recipient have discarded their copies of an electronic mail record, there may be back-up copies that can be retrieved. Electronic mail is normally backed up to assure system integrity and reliability. It is GPTC's policy to maintain two weeks worth of back-ups.

GPTC electronic mail users should be aware that generally it is not possible to assure the longevity of electronic mail records for record-keeping purposes. Electronic mail users and those in possession of college records in the form of electronic mail are cautioned, therefore, to be prudent in their reliance on electronic mail for purposes of maintaining a lasting record. Sound business practice suggests that consideration be given to transferring electronic mail to a more lasting medium. Each user will be limited to 3MB of mailbox space. Any electronic mail older than one year will be automatically purged from the system.

Georgia Piedmont Technical College Computing Resources Policy
Students, faculty and staff of Georgia Piedmont Technical College have access to computing resources and may be issued a user account to access some of these resources. The proper use of these resources is the responsibility of the individual who is allowed to use them. User accounts must not be shared; passwords should be protected. The privilege of using these computing resources brings with it the responsibility of exercising high standards of honesty and considerate behavior. Students are expected to use these computing resources only for their academic work, to demonstrate consideration of others, to not provide computing resources access to unauthorized users, to respect the privacy of others, and to obey all Georgia Piedmont Technical College regulations and relevant laws. The intent of this policy is to allow maximum freedom of use consistent with Georgia Piedmont Technical College policy, along with state and federal law-to help ensure a productive learning and working environment.

Using a computer without permission is theft of services and is illegal under state and federal laws. In addition, the following specific computer crimes are defined by state law (GA Code 16-9-90 et seq.):

  • Computer Theft (including theft of computer services, intellectual property such as copyrighted material, and any other property);

  • Computer Trespass (unauthorized use of computers to delete or alter data or interfere with others' usage);

  • Computer Invasion of Privacy (unauthorized access to financial or personal data or the like);

  • Computer Forgery (forgery as defined by other laws, but committed on a computer rather than on paper);

  • Computer Password Disclosure (unauthorized disclosure of a password resulting in damages exceeding $500 - in practice, this includes any disclosure that requires a system security audit afterward).

  • Misleading Transmittal of Names or Trademarks (falsely identifying yourself or falsely claiming to speak for a person or organization by using their name, trademark, logo, or seal (GA Code 16-9-93.1).
    Maximum penalties for the first four crimes in the list are a $50,000 fine and 15 years of imprisonment, plus civil liability. The maximum penalties for computer password disclosure are a $5,000 fine and 1 year of imprisonment, plus civil liability.

Georgia Piedmont Technical College's computing resources are provided for authorized users only. Privacy of our users is respected, but general usage and system resources are monitored in order to detect unauthorized access, illegal activities, and proper network performance. When there is suspicion of illegal or inappropriate activities, users' files are subject to inspection. Anyone using DeKalb Technical College's computing resources expressly consents to this monitoring and is duly advised that any evidence of criminal activity may be provided to school officials and/or law enforcement officials.

The following regulations apply to all users:

  • Computing resources are intended to be used for academic pursuits and should not be used for any type of commercial gain or advertising;

  • Use of computing resources is for Georgia Piedmont Technical College students, faculty, and staff in the pursuit of learning, teaching, or in assisting the administrative operations in support of these educational endeavors;

  • Deleted files are subject to being restored, using backup software or other utilities, as necessary to document user abuse;

  • E-mail, along with other computer files, cannot be considered private, given the open nature of the Internet; computer users should avoid sending or storing confidential information;

  • Users of computing resources must not attempt unauthorized access to computer installations outside of Georgia Piedmont Technical College's network;

  • Users agree to abide by all patent, trademark, trade name, and copyright laws. Georgia Piedmont Technical College prohibits the unauthorized copying or electronic transmission of copyrighted computer software, computer data, and software manuals. Such unauthorized duplication or installation is grounds for disciplinary action by Georgia Piedmont Technical College and is subject to criminal prosecution under the Federal Computer Fraud and Abuse Act of 1986. According to the U.S. Copyright Statutes, illegal reproduction or installation of software can be subject to civil damages of $50,000 or more, and criminal penalties including fines and imprisonment.

  • Users must not copy or delete software from any computer or server;

  • Users must not copy unauthorized software to any computer or server;

  • Users must not attempt to alter any restrictions associated with their computer accounts;

  • Computer users must not use computing resources to send or publish obscene, vulgar, rude, abusive, threatening, or harassing messages via electronic mail or other means;

  • Computer users must not attempt to access, store, or print offensive or pornographic material;

  • Computer users must not tamper with any computers, networks, equipment, software, configuration parameters, files, or documentation; this includes, but is not limited to, moving of equipment and connecting devices to computing equipment;

  • Computer users must not intentionally damage, interfere with, or copy the information of another user;

  • Computer users who maliciously introduce or spread computer viruses will have their computing resources terminated and are subject to other disciplinary action;

  • Users must refrain from monopolizing systems, overloading systems or networks with excessive data, or wasting computer time, connect time, disk space, printer paper, manuals, or other resources.
    Georgia Piedmont Technical College will suspend or revoke computing privileges to any individual or group who abuses the provisions listed above. If deemed appropriate for further action, violators of the computer resources regulations are subject to additional disciplinary action by Georgia Piedmont Technical College; state and federal agencies will be notified as necessary.

Georgia Piedmont Technical College makes no warranties of any kind, either express or implied, for the computers, computer systems and Internet access it provides. Georgia Piedmont Technical College shall not be responsible for any damages users suffer, including but not limited to loss of data resulting from delays or interruptions in service. Georgia Piedmont Technical College shall not be responsible for the accuracy, nature or quality of information gathered through technical college diskettes, hard drives or servers; nor for the accuracy, nature or quality of information gathered through technical college-provided Internet access. Georgia Piedmont Technical College shall not be responsible for personal property used to access Department computers or networks or for Technical college-provided Internet access. Georgia Piedmont Technical College shall not be responsible for unauthorized financial obligations resulting from technical college provided access to the Internet. If a student is not currently enrolled in classes, the email account becomes “inactive”. Inactive student email accounts will be deleted after a student has not attended classes for three semesters.

I have read and understand the Computing Resources Policy and related regulations stated above, in allowing me to use the computing resources of Georgia Piedmont Technical College. I agree that I will abide by these regulations. I, further, understand that Georgia Piedmont Technical College may suspend or deny my privilege to use these computing resources if my conduct violates the regulations given above.