- Computer Resource Access
- Physical Security
- Use of the TMCC Network
- Wireless Network Security
- Personally Identifiable Information (PII) and FERPA Email Guidelines
- Virus Detection
- Administrative Rights
TMCC computer resources are property of TMCC and may be used to assist users in the performance of their jobs. Use of TMCC computer resources is a privilege that may be revoked at any time.
Unauthorized use or access of TMCC computer resources is prohibited. Use of TMCC computer resources implies acceptance of the rights and responsibilities included in the TMCC Telecommunications Use policy.
The privacy of users of TMCC computer resources is carefully guarded but cannot be guaranteed. Examination of information accessed or stored on the system may occur if authorized by the appropriate authority(ies).
The following procedures apply to the security and operation of the TMCC computer network and applies to all academic and administrative users unless specified below. Failure to follow these procedures is a violation of the TMCC Telecommunications Use Policy. Violations will be taken seriously and may result in disciplinary action, including possible termination.
It is every employee's duty to use TMCC's computer resources responsibly, professionally, ethically and lawfully.
- Computer resources refers to TMCC's entire computer network. Specifically computer resources includes, but are not limited to: host computers, routers, switches, file servers, application servers, communication servers, mail servers, fax servers, Web servers, computer workstations, stand-alone computers, mobile devices such as laptops, tablets, and smartphones, software, data files, and all internal and external computer and communications networks (for example, internet, commercial online services, value-added networks, email systems, that may be accessed directly or indirectly from the TMCC computer network). TMCC’s computer network is separated for administrative and academic use.
- Users refer to all employees, independent contractors, consultants, temporary workers, and other persons or entities that use our computer resources.