Information Technology

Immediate Concerns for the Campus Community

Personally Identifiable Information Protection

Personally Identifiable Information (PII) is data that can be used to uniquely identify or locate a single person. Whether you are an institution handling thousands of sensitive records or an individual whose banking information is on an electronic device, you are a potential target.

Your computer is no longer the only device at risk; flash drives, smart phones, tablets and removable drives have increased the risk for data breaches. It is important that you know and exercise the steps that will keep your data safe.

Paramount in these warnings is appropriate use of passwords and encryption technology. The best advice is to avoid transferring or storing confidential data on removable storage devices. And always encrypt.

See Also:

Phishing and Vishing

The term phishing describes a situation where a malicious party solicits personal and financial information through the use of lures. These lures come in the form of emails or pop-up messages. If the lures come over a phone line, then the attack is referred to as vishing. The following link gives important steps you can take to avoid getting hooked by these schemes.

See Also:


Spyware refers to software that performs tasks on your computer, usually without your consent. Examples are programs that bombard you with advertising or collect your personal information. A standard, TMCC-supplied computer comes with Symantec spyware software scheduled to run at regular intervals. Learn about the preventative and reactionary measures you can take for other devices you own.

See Also:

Identity Theft

Identity theft occurs when someone uses your personal information without your consent to commit fraud. Unfortunately, you can't entirely control whether you become a victim or not. But you can take steps to minimize the risk.

See Also:


A computer virus is a self-replicating computer program that affects the way a computer operates. A virus often replaces existing executable files with a virus-infected copy. Some viruses can be intentionally destructive, destroying data, while some viruses are merely annoying.

If you suspect your computer has a virus, please contact IT Customer Service.

Other Threats

Peer-to-Peer File Sharing

Peer-to-Peer (P2P) file sharing technology allows people to share files online through an informal network. While convenient and conducive to an open workplace, P2P can also expose you to viruses, malware and illegal materials. Learn how to minimize the risks when partaking in P2P.

See Also:

Spam and SPIM

Spam, the electronic version of junk mail, is a nuisance at best, a danger at worst. SPIM, a version of spam sent over instant messaging software, poses the same risks. Both are an easy way for viruses to spread from computer to computer. Spam clutters your inbox and wastes time and resources. Spam and SPIM often phish for confidential information like credit card numbers, bank information or social security numbers. Never respond to spam emails. Never click on links within a suspicious email or instant message. Your common sense and judgment are your best tools against spam and SPIM.

See Also:

Risks for Home Users

Because the home user is outside the net of protection offered by TMCC's IT department and our carefully managed network, the home user faces more risk. Following are some links to help you effectively minimize those risks.

See Also:

Copyright and Filesharing

The TMCC network is not to be used to illegally download music, movies, computer programs or any other copyrighted work. Legislation is in effect that forces colleges and universities to implement controls against illegal file sharing or risk losing federal financial aid funding for students.

Even though TMCC takes steps to discourage illegal downloading, students are still liable for their online activities and need to make sure that they do not break the law while online. When it comes to illegal downloading, "If you are downloading something for free that you would normally pay for, stop to consider whether it is illegal."

See Also:

Other Information

Emails sent through the College's network are not private, as noted on the login page of every computer:

"Unauthorized user or access is prohibited. By continuing to use this computer system, you accept the rights and responsibilities in the TMCC Telecommunications User Policy ( effective March 2005). Your privacy is carefully guarded but cannot by guaranteed. Examination of information stored or accessed on the system may occur if authorized by the appropriate authorities."

Also, upon employment and orientation, each TMCC employee signs the TMCC Telecommunications Use Policy.

College News

Nursing Program Expanding in 2015

Maxine S. Jacobs Nursing Program will offer new degree and move into enlarged, remodeled facility.

Legacy Event Honors Students and Donors

TMCC Foundation hosts a festive dinner, creating connections for scholars and their benefactors.

Calendar of Events

TMCC Fall 2014 Resource Fair

Wednesday, October 22
Student Center, Dandini Campus

Free Student Workshop: Understanding Student Loans

Wednesday, October 22
RDMT 412, Dandini Campus