
We may collect information when you sign-in and connect to the Wi-Fi these include email, firstname, lastname, mac address of the device, time and the assigned IP address. As well as any extra questions that may of been asked when you connect.
For futher information on the data we collect and how it is used, please see our Privacy Policy.
Information Technology
Student/Patron Acceptable Use Agreement
Version: 3.2
Status: Final 04/10/2018
Contact: Chief Information Security Officer, VCCS Information Technology Services
Agreement
I acknowledge that this college is part of the Virginia Community College System (VCCS), home to Virginia’s 23 community colleges. As a user of the college’s local and shared computer systems, I understand and agree to abide by the following acceptable use agreement terms. These terms govern my access to and use of the information technology applications, services and resources of the VCCS, the college, and the information they generate.
Access to Computer and Network Resources
The college has granted access to me as a necessary privilege in order to perform authorized functions at the college. I will not knowingly permit use of my entrusted access control for any purposes other than those required to perform authorized functions related to my status as a student. These include logon identification, password, workstation identification, user identification, digital certificates or 2-factor authentication.
I will not disclose information concerning any access control unless properly authorized to do so by my enrolling college. I will not use any access control that the VCCS has not expressly assigned to me. I will treat all information maintained on the college computer systems as strictly confidential and will not release information to any unauthorized person.
I understand that I must use only those computer resources that I have the authority to use. I must not provide false or misleading information to gain access to computing resources. The VCCS may regard these actions as criminal acts and may treat them accordingly. I must not use VCCS information technology resources to gain unauthorized access to computing resources of other institutions, organizations, individuals, etc.
Intellectual Property
Copyright law protects computer software, database systems, electronic documents, and electronic media. A copyright is a work of authorship in a tangible medium. Copyright owners have the sole right to reproduce their work, prepare derivatives or adaptations of it, and distribute it by sale, rent, license lease, or lending and/or to perform or display it.
A student must either have an express or implied license to use copyrighted material or data, or be able to prove fair use. Students and other users of college computers are responsible for understanding how copyright law applies to their electronic transactions. They may not violate the copyright protection of any information, software, or data with which they come into contact through the college computing resources.
Downloading or distributing copyrighted materials such as documents, movies, music, etc. without the permission of the rightful owner is copyright infringement, which is illegal under federal and state copyright law. Use of the college’s network resources to commit acts of copyright infringement may be subject to prosecution and disciplinary action.
The penalties for infringing copyright law can be found under the U.S. Copyright Act, 17 U.S.C. §§ 501-513 (https://www.copyright.gov/title17/92chap5.html) and in the U.S. Copyright Office’s summary of the Digital Millennium Copyright Act (http://www.copyright.gov/legislation/dmca.pdf).
Prohibited Activities
I agree to abide by all applicable local, State, Federal, VCCS, and college policies, procedures and standards related to the use of the Internet, Social Media, and Electronic Communications. Prohibited activities include, but are not limited to:
Attempting to gain access to information owned by the college or by its authorized users without the permission of the owners of that information.
Accessing, downloading, printing, or storing information with sexually explicit content as prohibited by law or policy;
Downloading or transmitting fraudulent, threatening, obscene, intimidating, defamatory, harassing, discriminatory, or otherwise unlawful messages or images;
Installing or downloading computer software, programs, or executable files contrary to policy;
Accessing, uploading, downloading, transmitting, printing, communicating, or posting access-restricted college information, proprietary college information, sensitive data or records, or copyrighted materials in violation of college or state policy;
Posting information or sending e-mail with the intent to deceive by using another’s identity, an assumed name, or anonymously;
Attempting to intercept or read messages intended for others;
Intentionally developing, propagating, or experimenting with malicious programs (viruses, worms, spy-ware, keystroke loggers, phishing software, Trojan horses, etc.) on any college-owned computer;
Changing administrator rights on any college-owned computer, or the equivalent on non-Microsoft Windows based systems;
Using college computing resources to support any commercial venture, to promote political candidates, and to circulate advertising for products or any other use for personal financial gain.
Protection of Computer and Network Resources
I agree to follow any special rules posted or communicated by responsible staff members when using college computing laboratories, classrooms, and computers in the Learning Resource Centers.
I will do nothing intentionally that degrades or disrupts the computer systems or interferes with systems and equipment that support the work of others.
I will promptly report problems with college computing resources to the staff in charge or to the Information Technology Help Desk.
Reporting Requirements
If I observe any incidents of non-compliance with the terms of this agreement, I am responsible for reporting them to the college Information Security Officer and/or management of my college.
Security and Privacy
No user shall have any expectation of privacy in any message, file, image or data created, sent, retrieved, received, or posted in the use of the college’s equipment and/or access.
The VCCS System Office and colleges reserve the right (with or without cause) to monitor, access and disclose all data created, sent, received, processed, or stored on VCCS systems to ensure compliance with VCCS policies and local, State, or Federal regulations. College or System Office officials will have the right to review and/or confiscate (as needed) any equipment (College owned or personal) connected to a college owned device or network. In addition, except for exemptions under the Act, electronic records may be subject to the Freedom of Information Act (FOIA) and, therefore, available for public distribution.
Acknowledgement
I understand that it is my responsibility to read and abide by this agreement, even if I do not agree with all the terms and conditions indicated herein. If I have any questions about the VCCS Information Technology Student/Patron Acceptable Use Agreement, it is my responsibility to contact the college Information Security Officer or appropriate college official for clarification.
By acknowledging this agreement, I hereby certify that I understand the preceding terms and provisions and that I accept the responsibility of adhering to the same. I further acknowledge that should I violate this agreement, I will be subject to disciplinary action.
Privacy Policy 2023
Submitted Information
The information you provide when you login, such as social media account or details provided on the login form.
Additional Information
We may collect information on the websites you visit. We do not collect any information used to make financial transactions.
Device Information
Information about the device (mobile phone, tablet, laptop etc) you are using.
Location Information
If Location is enabled, we collect information on where in the venue you have been.
Network Information
We may collect information from your device on the IP addresses, internet service providers, browser type, language, viewed and exit pages, and date and time stamps.
Cookies
We may use Cookies like a website would; to enable us to distinguish you from other users.
How we store your data
Data is stored on our own secure servers in accordance with local regulations. If you do not login in to a location for more than 24 months, all personally identifiable data we store about you is deleted.
How your data is used
Your data may be used to understand how you use a particular venue, to communicate with your or to offer you relevant goods and services.
Who may use your data
Your data may be used by the owner of the venue you visited or selected third parties.
Your data may also be provided to regulatory bodies where we are under a legal obligation to do this, to protect our own rights or if we feel someones safety is at risk.
Accessing your own data
When you sign-up for news or special offers we send you an email to update your preferences.
You can request to be removed at any time using the link here.
Also you have the right to be forgotten and can remove all data we store on you on this system here.