TMCC

Information Technology

Network Operations and Security

Policy: Truckee Meadows Community College faculty, staff or students are required to abide by network operational and security procedures established by the college.

Originating Source: NSHE Computing Resources Policy. Nevada Revised Statutes sections 205.473 through 205.491

Responsible Office: Information Technology

Updated: August 2010


Procedure

See Also: Computer Security Incident Action Procedures

Introduction

TMCC Computer Resources are property of TMCC and may be used to assist users in the performance of their jobs. Use of TMCC Computer Resources is a privilege that may be revoked at any time. Unauthorized use or access of TMCC Computer Resources is prohibited. Use of TMCC Computer Resources implies acceptance of the rights and responsibilities included in the TMCC Telecommunications Use policy. The privacy of users of TMCC Computer Resources is carefully guarded but cannot be guaranteed. Examination of information accessed or stored on the system may occur if authorized by the appropriate authority(ies).

Procedures

The following procedures apply to the security and operation of the TMCC computer network and applies to all academic and administrative users unless specified below. Failure to follow these procedures is a violation of the TMCC Telecommunications Use Policy. Violations will be taken seriously and may result in disciplinary action, including possible termination.

It is every employee's duty to use TMCC's computer resources responsibly, professionally, ethically and lawfully.

Definitions

From time to time in these procedures, we refer to terms that require definitions:

  • Computer Resources refers to TMCC's entire computer network. Specifically Computer Resources includes, but are not limited to: host computers, routers, switches, file servers, application servers, communication servers, mail servers, fax servers, Web servers, computer workstations, stand-alone computers, mobile devices such as laptops, tablets, and smartphones, software, data files, and all internal and external computer and communications networks (for example, Internet, commercial online services, value-added networks, email systems, that may be accessed directly or indirectly from the TMCC computer network). TMCC’s computer network is separated for administrative and academic use.
  • Users refer to all employees, independent contractors, consultants, temporary workers, and other persons or entities that use our Computer Resources.

Computer Resource Access

  1. All Users of TMCC administrative Computer Resources must first complete and submit a TMCC Network Access Security Application (NASA) online form. The submission of this form is required to gain access to various administrative TMCC Computer Resources and applications including email, mainframe and databases.
  2. When a TMCC employee changes departments within TMCC or leaves the employment of TMCC, the TMCC Network Access Security Application (NASA) online form must be submitted by the individual's supervisor/department to either change the access of the individual or request the individual's access be deleted.
  3. All TMCC-owned computer resources must first be configured by the TMCC Information Technology (IT) department before release to the customer for business use and before access to TMCC's wired or wireless network. At a minimum, this typically includes installation of TMCC software and configuration of network settings.

Physical Security

  1. Prior to leaving computers unattended, users are responsible for securing their computer workstation, preventing malicious users from gaining immediate access to TMCC Computer Resources.
  2. When an individual leaves the employment of TMCC, the user profiles assigned to that individual will be removed from their primary computers prior to being assigned to another employee, thus eliminating the possibility that any personal information remains on the computer.
  3. Computers connected to the administrative network will automatically have a screen lock enabled after 10 minutes of inactivity.
  4. Computer room security is governed by the TMCC Computer Room Access policy.

Network Security

Firewalls are installed to improve TMCC telecommunications security. Think of firewalls as guards at the door and authentication via a login as the locks.

  1. Network Login: All computers connected to the TMCC network require logins to the TMCC network.
  2. Use of the TMCC Network: Unauthorized access is prohibited. By continuing to use this network and computer system, users accept the rights and responsibilities in the Truckee Meadows Community College Telecommunications Use Policy (effective March 2005). User privacy is carefully guarded but cannot be guaranteed. Examination of information stored or accessed on the system may occur if authorized by the appropriate authorities.
  3. Any devices connected to TMCC's network either through a direct Ethernet connection or wireless connection must have the device's Media Access Control (MAC) addresses registered with the TMCC IT department. The TMCC IT department will then set the IP address(es) that the device is allowed to use for access to the Internet or other TMCC Computer Resources.
  4. Access to the TMCC administrative network from a modem or non-TMCC wireless access point or mobile hotspot connection originating within a TMCC location (i.e., Dandini Campus, Meadowood Center, IGT Applied Technology Center, Performing Arts Center, High Tech Center at Redfield, etc.) is not allowed unless specifically established or authorized by the TMCC IT department.
  5. Administrative computing devices on the TMCC network that must be accessed from an outside location must receive prior approval from the TMCC IT department. The TMCC IT department will establish the connection protocol that must be followed to access the internal computer from the outside. This is normally accomplished via a TMCC-provided virtual private network connection (VPN).
  6. Users may not alter or copy a file belonging to another User without first obtaining permission from the owner of the file. Ability to read, alter, or copy a file belonging to another User does not imply permission to read, alter, or copy that file. Users may not use the computer system to "snoop" or pry into the affairs of other Users by unnecessarily reviewing their files and email.
  7. A User's ability to connect to other computer systems through TMCC Computer Resources or other means does not imply a right to connect to those systems or to make use of those systems unless specifically authorized by the operators of those systems or by appropriate TMCC authorities.
  8. Each User is responsible for ensuring that use of outside computers and networks, such as the Internet, does not compromise the security of TMCC's computer network. This duty includes taking reasonable precautions to prevent intruders from accessing TMCC Computer Resources without authorization and to prevent the introduction and spread of viruses. This is primarily accomplished by not circumventing and allowing:
    1. Anti-virus programs to operate on and scan data on their computer workstations on a daily basis; and
    2. Security protocols issued by the TMCC IT department and installed on their computer workstations to operate.
      1. Allowing malicious code to run on Computer Resources or broadcasting unregulated data traffic over the TMCC network is prohibited.
      2. Customers using the file transfer protocol (FTP) to transfer files to and from the TMCC network should recognize that FTP is not a secure method of file transfer.
      3. Remote access to and from TMCC computer workstations must be approved by Information Technology. Typically, remote access is strictly controlled for security reasons.
      4. Computers personally owned by TMCC employees (desktop computers, laptops, etc.) are not to be physically connected to the TMCC network since there is no guarantee the employee's systems are actively protected with the most current anti-virus or anti-SPAM signature files or have not been compromised by hackers.

Wireless Network Security

  1. Wireless network connections are on a shared network. Customers can use wireless networks at their own risk since wireless data traffic can be obtained by untrusted or unknown entities. Sensitive or confidential data must only be transmitted using wired networks. Since the wireless network is shared, it is more susceptible to viruses and other network attacks than the TMCC wired network and thus should be considered unreliable. Users of the wireless network must take every precaution to protect their devices from outside attacks. If problems occur on the wireless network, the network can be disconnected without notice at any time and thus should be considered unreliable.
  2. Other than providing Internet access, direct access into TMCC Computer Resources via a wireless network is normally not allowed. Users must authenticate through provided security systems to gain authorized right to use TMCC Computer Resources.
  3. TMCC administrative use laptops must connect to their primary, home subnet via a wired network drop to cache current domain authentication credentials within 90 days of use elsewhere. Wired connections for laptops other than on their primary, home subnet are not supported without prior notice and approval.
  4. Wireless Access Points (WAPs) In order to ensure the security of the overall TMCC network, only TMCC-provided WAPs are to be used to access the TMCC network. Non-TMCC WAP or mobile hot spot devices are normally not allowed and when detected will be shunned from network access. If a non-TMCC WAP or mobile hot spot is allowed by the TMCC IT department to be used, the device must have its Media Access Control (MAC) addresses registered with the TMCC IT department. The TMCC IT department will then set the IP addresses the WAP is allowed to use for accessing the Internet or other TMCC network resources. However, if other TMCC-owned network devices are available for providing the same connectivity, the TMCC resources must be used.

Email

  1. Generic login names for accessing TMCC's Google Apps for Education email are not allowed on TMCC's network. Although departmental email accounts may be established to facilitate contact with customers or other department work, in order to access any TMCC Google Apps for Education email account, the user must have an individual TMCC Google Apps for Education email account login name.
  2. All email messages processed by select TMCC mail servers will be subjected to an automated scanning process to (1) determine the likelihood that messages are SPAM and (2) detect viruses. Messages will be delivered, delivered with warnings, or rejected accordingly.
  3. Email stored on TMCC's Google Apps for Education system is automatically deleted for messages that have been in Trash for more than 30 days or if purged from the Trash by the email account owner.
  4. Tiny URLs are discouraged from use since they hide the real URL.

Electronic Communications Netiquette

All TMCC using electronic communications below are to abide by Netiquette.

  • Personally Identifiable Information (PII) and FERPA email guidelines
  • TMCC email communications
  • TMCC Instant Messaging communications
  • TMCC Listserv communications
  • TMCC blog communications
  • Other similar electronic communications

Personally Identifiable Information (PII) and FERPA email guidelines

FERPA uses vague language such as "reasonable methods" to safeguard information and is purposely non-specific regarding the use of technology methods and standards. FERPA does not provide information on the use of email and the Family Privacy Compliance Office (FPCO) has yet to provide any official direction for the FERPA compliant use of email. As such, we must apply a set of reasonable guidelines that should be followed when communicating FERPA related information over email.

  1. If there is a need to transmit a file with Personally Identifiable Information (PII) to another TMCC employee, use the Secure Information Transfer System (SITS).
  2. Personally identifiable information (PII) is never to be included in the subject line of any email, screen shots, IM or "chat". If a subject line contains a Social Security Number or NSHE ID number, then a violation of FERPA has occurred. Social Security Numbers are never to be sent via email.
  3. The NSHE ID and student name can be sent within the body of an email and as an attachment. Emails containing FERPA-related information may only be sent to the "official" NSHE or Institution email address of the authorized recipient (i.e., nshe.nevada.edu, unr.edu, unlv.edu, tmcc.edu, washoeschools.net, etc.).
    FERPA-related email may not be sent or forwarded to a personal address such as one associated with Gmail, Hotmail, or Yahoo. Students should be required to use the provided TMCC email so that staff and faculty have reasonable certainty that communications are with the appropriate individual.
    Should you receive an email from a student’s personal email the response will be:
    "Thank you for your email. In order to protect students’ privacy and to comply with federal law regarding student records (Family Educational Rights and Privacy Act, FERPA ), Emails containing FERPA related information will only be sent to the official Institution e-mail address of the authorized recipient (tmcc.edu). FERPA related email will not be sent or forwarded to a personal address such as one associated with Gmail, Hotmail, or Yahoo. Grades will not be emailed. You will need to use your TMCC provided student email account to communicate with TMCC departments, faculty and staff. Please check your TMCC email regularly for communications from the college."
  4. Emails containing FERPA-related information should be deleted when the task/subject is completed.
  5. Do not email or publicly post grades. An unauthorized release of grades to someone who is not a school official can result in the institution being found to be in violation of FERPA.
  6. All email must include a disclaimer or tagline:
    "The information transmitted is intended only for the person or entity to which it is addressed and may contain confidential and/or privileged material. Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon, this information by persona or entities other than the intended recipient is prohibited. If you received this in error, please contact the sender and delete the material from any computer."
    (Disclosure and directory information BOR Handbook Title 4, Chapter 1, Section 26.)
  7. The term "personally identifiable information"includes, but is not limited to:
    1. The student’s name;
    2. The name of the student’s parent or other family members;
    3. The address of the student or student’s family;
    4. A personal identifier, such as the student’s Social Security Number, student number (NSHE/TMCC ID), or biometric record;
    5. Other indirect identifiers, such as the student’s date of birth, place of birth, and mother’s maiden name;
    6. Other information that, alone or in combination, is linked or linkable to a specific student that would allow a reasonable person in the school community, who does not have personal knowledge of the relevant circumstances, to identify the student with reasonable certainty; and/or
    7. Information requested by a person who the educational agency or institution reasonably believes knows the identity of the student to whom the education record relates. (34 CFR § 99.3)

Email Netiquette

Information for the netiquette section below was retrieved August 10, 2006 from http://www.albury.net.au/new users/netiquet.htmand then modified for adaptation into the TMCC work environment.

  1. Don't assume any Internet communication is completely secure. "Never put in a mail message anything you would not put on a postcard". Likewise, independently verify any suspect mail, as addresses can be forged.
  2. If you are forwarding or re-posting a message, don't change the original wording.
  3. If you are replying to a message, quote only the relevant parts.
  4. Never send chain letters, they are forbidden on the Internet. Notify your System Administrator if you receive one.
  5. Do not send abusive or heated messages (flames). If you receive a flame, it is best to ignore it.
  6. Take care with addressing mail.
  7. Allow time for mail to be received, and replied to, keeping in mind time differences around the world and other people's busy schedules.
  8. If you want your mail to be read, don't make it too long unless the receiver is expecting a verbose message. Over 100 lines is considered long.
  9. Remember, the Internet is a global community, and other people's values and outlook on life may be different from your own. Be tolerant and careful with slang or phrases that may not be understood in another country.
  10. Use mixed (proper) case; UPPER CASE LOOKS AS IF YOU'RE SHOUTING.
  11. Mail should have a subject header that reflects the content of the message.
  12. Unsolicited email advertising is unwelcome. The Public Information Office should be contacted to distribute general interest announcements or advertisements.
  13. Appropriate Use of the Email System:
    1. Please refrain from sending emails of a personal nature to the TMCC "All Mailboxes" address unless they are business related. When one person alone does this it creates about 1400 pieces of mail. Now if 500 people did the same thing it would generate over 700,000 pieces of mail. Furthermore, many of these emails have large images embedded within the email. Obviously, those actions would add a considerable amount of congestion to our network, slowing down Internet access and email delivery. Personal emails that are thought of as general interest should be referred to the Public Information Office for inclusion in the appropriate TMCC e-Newsletter.
    2. Additionally, during holidays, fun attachments are sent via email (electronic Christmas cards, etc.); these attachments are usually large files that can adversely congest the TMCC network if the sender is a TMCC employee. So, again, please refrain from sending these types of emails out of the TMCC network.

Listserv or Other Mailing List Netiquette

  1. It is always a good idea to read what others in the list or group are saying for a while, to get a feel for the nature of the list/group, and what is or is not acceptable to the list/group.
  2. If posting to Listservs or Newsgroups, be aware that many are archived, and the archives are available for a very long time. Don't say anything that might come back and haunt you years down the track. It is generally not possible to retrieve messages once they have been sent.
  3. Be very careful about advertising, some groups welcome it; most others do not!
  4. Watch for and read any FAQs (Frequently Asked Questions) before posting a question to the group.
  5. Messages should be concise and relevant to the group. Don't post messages to inappropriate newsgroups.
  6. Spelling mistakes tend to be the rule rather than the exception. Questioning someone else's spelling is not good netiquette, and not necessary unless it occurs in a critical place, like a possibly misspelled URL
  7. Don't get involved in or respond to Flame Wars.
  8. If you find a newsgroup or topic offensive, avoid it. Sending harassing messages to the group is not only frowned on, it may be illegal.
  9. Keep private messages private, don't post to the group as well.

Instant Messaging, Chat, Blog, or other Interactive Services Netiquette

  1. Listen to a channel first, to get the feel of what is and is not acceptable. Above all, respect the culture of the group.
  2. Remember the world is a big place full of very different people.
  3. If you find a topic that offends you, then don't join it.
  4. If you find yourself in a channel that becomes offensive to you, leave it.
  5. Unacceptable behavior on your part may get you banned from that server.
  6. Any blog posting, whether made at work or from home, should not include material that affects the workplace, either by harassing other employees, by damaging the college's reputation, or by otherwise affecting employee morale. TMCC's Telecommunications Use Policy applies to blogging.
  7. There is also a netiquette rule for how to deal with someone who has violated one of the rules of netiquette: If you believe someone has violated netiquette, send him or her a message by private email; do not post a follow up to the offending post. Be polite. The author may not have realized his or her mistake, may be a beginner, or may not even have been responsible for the "crime" — his or her account may have been used by someone else, or the address may have been forged. Furthermore, a person who breaks netiquette over and over may be doing it intentionally to disrupt the group, in which case public flaming over the violation would amount to what is termed feeding the troll.

Virus Detection

  1. Viruses can cause substantial damage to computer systems. Each User is responsible for taking reasonable precautions to ensure he or she does not introduce viruses into TMCC's computer network. To that end, all material received on external storage devices or media and all materials downloaded from the Internet or from computers or networks that do not belong to TMCC must be scanned for viruses and other destructive programs before being placed onto the computer system. Users should understand that their home computers and laptops may contain viruses. All data transferred from these computers to TMCC Computer Resources must be scanned for viruses.
  2. TMCC is licensed for anti-virus protection software for Intel based computers and Macintosh computers. User should not disable the anti-virus software or install any other anti-virus software on TMCC computers without receiving permission from Information Technology. When TMCC employees receive warnings about viruses from sources outside of the TMCC IT department, they should forward those warnings to the TMCC IT department for validation. If validated and warranted, the TMCC IT department will issue a campus-wide alert about the virus. Employees can also check the TMCC IT department’s website for the latest information on Internet security concerns.
  3. TMCC conducts virus scanning to reduce the number of viral attachments reaching TMCC users. Messages containing attachments are subjected to virus scanning and those determined to be viral will be rejected with an error. No notification will be sent by TMCC to the intended recipient. No notification will be sent by TMCC to the sender. Such messages may be quarantined for further analysis. Potentially dangerous executable attachments (for example, .ade, .adp .bas, .bat, .chm, .cmd, .com, .cpl, .crt, .exe, .hlp, .hta, .inf, .ins, .isp, .js, .jse, .mdb, .mde, .msc, .msi, .msp, .mst, .pcd, .pif, .reg, .scr, .sct, .shb, .shs, .vb, .vbe, .vbs, .wsc, .wsf, and .wsh) and encrypted ZIP attachments containing such files may be rejected. All other attachments passing virus scanning will be delivered normally.
  4. TMCC desktop computers, laptops and tablets must have the college's current anti-virus software installed, updated with the latest anti-virus signature and actively running.
  5. If an individual’s personal desktop or mobile device that is connected to TMCC Computer Resources gets infected, but does not have the college's current anti-virus software installed (for desktop/laptop/tablet devices only), updated with the latest anti-virus signature and actively running, the college is not responsible for fixing any problems that occur on the User's desktop or laptop computer as a result.

SPAM

"SPAM" is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most SPAM is commercial advertising, often for dubious products, get rich quick schemes, or quasi-legal services. SPAM costs the sender very little to send—most of the costs are paid for by the recipient or the carriers rather than by the sender.

TMCC has an anti-SPAM filter in place to flag unwanted SPAM in the TMCC email system. However, not all SPAM is detected. So, users can follow SPAM email filtering procedures to reduce email SPAM.

Passwords

  1. Users are responsible for safeguarding their passwords for access to the computer system. Individual passwords should not be written down, printed, stored online, or given to others. Users are responsible for all transactions made using their passwords. No User may access the computer system with another User's password or account.
  2. Use of passwords to gain access to the computer system or to encode particular files or messages does not imply that Users have an expectation of privacy in the material they create or receive on their computer or on TMCC Computer Resources.
  3. At no time will generic passwords be issued to allow multiple Users to use the same password for accessing TMCC Computer Resources.
  4. Passwords will expire every 90 days.
  5. Users are responsible for:
    • Changing their network password often. This should be done every two to three months. If Users suspect account tampering, Users should change their password immediately and report the tampering to The TMCC IT department’s IT Customer Service.
    • Making their password easy to remember but not easy for someone who may know them to guess (does not use birth dates, home phone numbers, favorite beverages, your dog's name, etc.)
  6. Choosing a login password that must meet the minimum security requirements outlined here:
    • Is at least 8 characters;
    • Must be unique; that is, it has not been used in the previous 24 passwords;
    • Does not contain your account or full name (for example, if your name is John Doe, your password should not contain 'jdoe' or 'John' or 'Doe');
    • Contains all four of the following character groups:
      • English uppercase characters (A through Z);
      • English lowercase characters (a through z);
      • Numerals (0 through 9);
      • Non-alphabetic characters (such as !, $, #, %). For example, "My dog smells bad after rolling in the grass" could be made into a password that looks like: md$bAr1tg.
    • Registering their password on the Password Reset System to allow self-service password resets.
    • If Users allow others such as friends, family or colleagues to use their account, they are violating TMCC and NSHE policy.
  7. TMCC-owned mobile devices will have a screen password enforced; personal mobile devices that access TMCC data should have a screen password enabled.

User Maintained Servers

Users must inform the TMCC IT department of any personal or college servers not maintained by TMCC IT staff running on the TMCC network. This includes servers hosting web pages that are linked to the TMCC website. The information provided will include the physical location, IP address and MAC address of the server and the URL of any web pages originating from the server. This is to ensure the server receives appropriate Internet access and proper security patches and updates are applied. Whenever possible, web pages should be hosted on servers maintained and monitored by the TMCC IT department.

Administrative Rights

  1. Normally, faculty and staff at TMCC are provided with a computer in order to complete the tasks required for their job. The computer belongs to TMCC, not the individual employee, and is set up to ensure the primary software required for their job is configured and operating properly (i.e., email, word processing, spreadsheets, etc.). With the advent of current desktop operating systems, TMCC is able to ensure only authorized users log into TMCC Computer Resources. Normally, those using computers with the Windows operating system are given "Power User" rights. This allows the individual the ability to perform most common tasks, such as running applications, using local and network printers, changing desktop screensavers and wallpaper, and shutting down the computer. Typically, they can perform all functions necessary for doing their job. This may require requesting assistance from IT Customer Service for loading software necessary for their job.
  2. Only TMCC IT department staff is typically allowed "administrative" rights. This is because a User with administrative rights has the ability to (1) modify the desktop operating system which can cause problems and (2) circumvent TMCC computer and network security controls. Too often, these are the primary causes of reduced productivity with a computer at the college. By not granting administrative rights, it helps the college enforce the TMCC Telecommunications Use policy by ensuring that individuals:
    1. Cannot knowingly or carelessly perform an act that will interfere with the normal operation of computers, terminals, peripherals, or networks;
    2. Cannot knowingly or carelessly run or install on any computer system or network, or giving to another user a program intended to damage or to place excessive load on a computer system or network. This includes, but is not limited to, programs known as computer viruses, Trojan horses, and worms;
    3. Cannot violate terms of applicable software licensing agreements or copyright laws.
  3. Not granting administrative rights allows the college to ensure the software loaded on TMCC computers is compatible with current desktop operating systems.
  4. Convenience typically should not be enough of a reason for granting administrative rights. However, academic department chairs can request administrative rights be granted to an academic faculty member within their department by sending a request to IT Customer Service.
  5. If the User has been granted administrative rights, the User will have placed themselves at risk from either attacks from other computers (inside or outside of the network) or from problems caused by mismanagement of their own computer. In either case, since the faculty member now has administrative rights to their computer, it will be extremely difficult for the TMCC IT department to troubleshoot the User's computer quickly if problems occur.
  6. If the User's computer is found to be the cause of problems on the TMCC network or if they have other problems caused by mismanagement of their own computer, the only recourse to the TMCC IT department will be to shut down the User's computer system and restore it to the base image previously established for the model of computer in use. The faculty member should feel free to contact IT Customer Service to periodically update the base image of their computer to proactively assist with updates to their computer workstation.

Physical Cables

We do not allow network connection cables longer than 10 feet to be used on the network. Cables greater than this length cause network attenuation and connectivity problems. Eliminating long cables from the network keeps network traffic moving quickly and efficiently and eliminates unwanted "noise" on the network.

Backups

  1. Backups are created for data residing on servers maintained by TMCC IT. Daily incremental backups are maintained for up to two weeks. Weekly full backups are maintained for six months to one year depending on storage capacity. Quarterly full backups are maintained for one year. Weekly backups are stored at two TMCC sites for disaster recovery purposes. Quarterly full backups are stored at the TMCC disaster recovery site.
    1. In user's home directories, the following file types are excluded from backup: AAC, AVI, GIF, JPEG, JPG, M4?, MOV, MP?, MPEG, PNG, RAM, TIF, TIFF, WAV, WMV
    2. Temporary files types are excluded from all backups.
  2. Google Apps backups are performed by an independent third-party backup system, Backupify. Backups run three times daily on a variable schedule. Each user is allocated a fixed amount of backup space. Up to 10 previous versions of documents will be maintained, if the user has enough free space.
  3. TMCC IT does not backup user devices, such as workstations, laptops, mobile devices, etc., or personal devices. Users should maintain their own backups for data that is not backed up by TMCC IT. Data backed up for the user by external providers (cloud backup, etc.) must be evaluated to determine if the external provider complies with any legal regulations over that data (FERPA, HIPAA, etc.). It is recommended to keep at least quarterly backups stored at a secure location that is different from the primary data storage location.

Internet Access

Employees are provided with access to the Internet to assist them in performing their jobs. The Internet can be a valuable source of information and research. In addition, email can provide excellent means of communicating with other employees, our students and partners, outside vendors and other businesses. Use of the Internet, however, must be tempered with common sense and good judgment. If individuals abuse their right to use the Internet, it may be taken away from them. In addition, they may be subject to disciplinary procedures.

VPN/Remote Access

If anyone is provided remote access to your TMCC-owned resource for valid, business-related purposes, users are responsible for ensuring PII or sensitive information is not exposed.

Maintenance Windows

As a rule of thumb, be aware that maintenance may be performed on any TMCC computer system (network battery systems, cabling, servers, switches, routers, etc.) prior to 7:30 a.m., Monday through Friday. As a courtesy, IT attempts to inform the campus when such maintenance occurs, but notification may not always occur. If computer systems are not available prior to 7:30 a.m., ongoing maintenance is probably the reason.

The major maintenance periods when network services may not be available are 5 p.m. on Saturday evenings to 8 a.m. on Sunday mornings as well as 8 p.m. to midnight on Sunday evenings.

Network Capacity

Respect the finite capacity of TMCC's network resources and limit use to the extent needed for authorized activities, so as not to consume an unreasonable amount of those resources or to interfere unreasonably with the activity of other users. TMCC may require users of information technology resources to limit or refrain from specific uses in accordance with this principle. TMCC will judge the reasonableness of any particular use in the context of all of the relevant circumstances.

Originating Policy or Source: TMCC Telecommunications Use Policy; Information Technology Core Service Catalog

Responsible Office: Information Technology

Updated: May 2013

College News

Apply Today for a Scholarship from TMCC Foundation

New extended application deadline: Apply by May 18 for scholarships.

Degree Débuts – Associate of Arts-Spanish Emphasis

Also: Summer session to offer second year German and Russian languages.

Calendar of Events

Philippine United Student Organization (P.U.S.O.) General Meeting

Thursday, April 24
RDMT 256, Dandini Campus

Part-time Faculty Awards Ceremony

Thursday, April 24
Student Center, Dandini Campus