This site requires JavaScript to be enabled
An updated version of this article is available
Knowledge Base: Public
Category: Information Security / Identity & Access Management
45850 views

35.0 - Last modified on 2025-06-27 Revised by Joe Jamison

34.0 - Last modified on 2025-06-24 Revised by Noah Chang

33.0 - Last modified on 2025-06-13 Revised by Edgar Nunez

32.0 - Last modified on 2025-06-11 Revised by Stephanie Holmes

31.0 - Last modified on 2025-05-27 Revised by Stephanie Holmes

30.0 - Last modified on 2025-04-16 Revised by Stephanie Holmes

29.0 - Last modified on 2025-02-28 Revised by Stephanie Holmes

28.0 - Last modified on 2025-02-28 Revised by Stephanie Holmes

27.0 - Last modified on 2025-02-27 Revised by Stephanie Holmes

26.0 - Last modified on 2025-02-20 Revised by Edgar Nunez

25.0 - Last modified on 2025-01-24 Revised by Chris Reeves

24.0 - Last modified on 2025-01-17 Revised by Logan Hill

23.0 - Last modified on 2024-11-25 Revised by Stephanie Holmes

22.0 - Last modified on 2024-10-23 Revised by Stephanie Holmes

21.0 - Last modified on 2024-10-11 Revised by Stephanie Holmes

20.0 - Last modified on 2024-09-18 Revised by Stephanie Holmes

19.0 - Last modified on 2024-09-13 Revised by Stephanie Holmes

18.0 - Last modified on 2024-06-21 Revised by Stephanie Holmes

17.0 - Last modified on 2024-06-13 Revised by Stephanie Holmes

16.0 - Last modified on 2024-06-12 Revised by Stephanie Holmes

15.0 - Last modified on 2024-06-11 Revised by Stephanie Holmes

14.0 - Last modified on 2024-05-14 Revised by Stephanie Holmes

13.0 - Last modified on 2024-05-14 Revised by Stephanie Holmes

12.0 - Last modified on 2024-04-11 Revised by Stephanie Holmes

11.0 - Last modified on 2024-03-22 Revised by Stephanie Holmes

10.0 - Last modified on 2024-03-22 Revised by Stephanie Holmes

9.0 - Last modified on 2024-03-14 Revised by Stephanie Holmes

8.0 - Last modified on 2024-03-05 Revised by Tanner Davis

7.0 - Last modified on 2024-02-20 Revised by Stephanie Holmes

6.0 - Last modified on 2024-02-15 Revised by Stephanie Holmes

5.0 - Last modified on 2024-02-15 Revised by Stephanie Holmes

4.0 - Last modified on 2024-01-05 Revised by Stephanie Holmes

3.0 - Last modified on 2023-11-03 Revised by Walter Allen

2.0 - Last modified on 2023-11-02 Revised by Stephanie Holmes

1.0 - Created on 2014-02-18 Authored by IET

Question

What happens to my Computing Account when I leave or graduate from UC Davis?

Overview

Campus sponsored licensing for products discontinues once you leave UC Davis. This includes but is not limited to Microsoft, SIS web, and Google products and services.
Please see the listing below for specifics.
To reduce any data loss, please download resources you would like access to after graduation or leave UC Davis to personal non-UC Davis accounts.

If you are using any electronic communications resources, such as an email address, for incidental personal use (e.g. for a login address to a non-UC Davis web page) it is strongly encouraged that you switch to using a personal non-UC Davis email address so you do not lose access to those sites or services.

Please see the following sections for the impact it will have for your department and for your individual access:

The information on this page is subject to change. Please check back for updates.


Answer

Your computing account will close.

As you prepare your information for possible data and email log transfers as you leave UC Davis, please keep in mind the following: 


Offboarding Checklist:

Get copies of your academic coursework and grades

Make sure you have what you need for applying to graduate schools and your academic records.

Move your data

You will no longer be able to access campus-hosted services, such as and not limited to myucdavis, Office 365/Microsoft Products including OneDrive, Docusign, UC Davis Canvas, UC Davis Zoom, and SISweb. Please download personal items before you lose access.

Make arrangements for your email and mailing lists

Your individual email account closes. If you are using the UC Davis email address for incidental personal use (e.g. for a login address to a non-UC Davis web page), switch to using a personal non-UC Davis email address so you do not lose access to those sites or services. 

Please see this page for updates on this service: https://iet.ucdavis.edu/email-service-transition 

Update your personal information

Stay in touch! For access to your records and alumni information, 

Can I extend my account access after closure?

Unfortunately, without an active faculty, staff, or student record, all UC Davis Computing Accounts begin an automatic closure process.

I forgot my passphrase. 

If you need help resetting your passphrase, please see this page for available options including how to contact IT Express should you need additional assistance with that process:
Change your passphrase