Information Technology Security

  1. Users must read, understand, and adhere to all Central Texas College District policies and exercise good judgment in the protection of information resources. Students and guests will follow the rules posted within computer labs. If computer usage rules are not available, users should follow local, state, and national laws regarding computer and Internet usage. Users shall log off systems when they are finished.
  2. Central Texas College District is not responsible for privately owned systems (e.g., laptops) or data that becomes compromised due to wireless network usage. Users utilizing the Central Texas College District student/guest wireless network do so at their own risk and are encouraged to transmit sensitive data only when strong encryption becomes available.
  3. Central Texas College District provides open access to an unencrypted student/guest wireless network. Wireless access points not authorized and not managed by the IT Division are not permitted and will be shut down upon discovery by IT.
  4. Central Texas College District is not responsible for any illegal content that is received, transmitted, or stored by the user.
  5. Users gaining access to Central Texas College District resources via a virtual private network (VPN), the wireless network, or Outlook Web Access (OWA) are responsible for ensuring their systems are free of malware.
  6. Users should exercise caution when opening email and browsing the Internet, and should avoid opening unexpected or suspicious attachments.
  7. Users shall immediately report any suspected or known information security compromises to the IT Help Desk.