GHC Home > Information Technology > Self Help (Technology Overview) > Connect to Wi-Fi on my Device > Guest Wireless

Guest Wireless

Please read the following items:

This guest Wi-Fi network is provided as a free, rate-limited service and at the sole discretion of Georgia Highlands College. By using this network, you agree to the Georgia Highlands College Acceptable Use Policy and Standard below. Violation of these policies will result in your access being disconnected, suspended, and/or permanently revoked.

This Wi-Fi network is not private or secured and users should have no expectation of privacy. Communications over this network are subject to monitoring by Georgia Highlands College, the institution’s Internet service provider, and the Board of Regents of the University System of Georgia.

GHC Students: visit [wireless setup instructions page] for information about connecting to our student Wi-Fi network for faster, more secure Wi-Fi access.

Purpose

The purpose of this policy is to ensure compliance with the requirements and standards defined in the IT Acceptable Use Standard.This policy sets forth the principles that govern appropriate use of systems and information technology resources at Georgia Highlands College. These resources are intended to support the educational, instructional, research, and administrative activities of the institution and their use is granted as a privilege. These resources are the property of the state of Georgia and the Board of Regents of the University System of Georgia. All users are bound by Georgia Highlands College and Board of Regents policies and must also comply with applicable state and federal laws. This policy serves as a general framework for information security with specific, supporting policies governing the use of systems and information technology resources. Inappropriate use of technology resources exposes Georgia Highlands College to risks to the integrity, availability, and confidentiality of systems and data.

Scope

This policy applies to all users of Georgia Highlands’ technology-related resources including, but not limited to, faculty, staff, students, alumni, guests or agents of the institution and any external individuals or organizations accessing these resources. Any device that is capable of being connected locally or remotely to a campus network or transmitting data via the campus data networks either by wired or wireless means is subject to this policy.

Policy Statement

Acceptable use of Georgia Highlands College systems and information technology resources requires that users behave ethically and with academic integrity. Users must respect intellectual property and ownership of content and agree to comply with institution policies, procedures, regulations, and guidelines. Users must also act responsibly, respect others’ rights to privacy and freedom from intimidation and harassment, and do their part to maintain the security and integrity of these resources.

Privacy

Georgia Highlands College makes every effort to protect the privacy of information on institution systems and networks. The institution reserves the right to take appropriate actions necessary to protect the integrity and security of these assets. This includes the right to monitor and record user activity on systems, networks, and workstations and immediately disconnect any device that is causing disruption or being used in violation of any policies or laws. In addition, if it is determined that an individual may be in violation of the law or Georgia Highlands College policies, his or her institution-issued device(s), accounts, records, and logs will be subject to review and analysis with approval of the Executive Leadership Team. Information contained on equipment or passing over campus networks, including but not limited to electronic communication, is subject to monitoring and examination. This information may also be disclosed for audit, legal, open records requests, or other management purposes.

Enforcement

Inappropriate use may result in the loss of system and information technology resource privileges and may include additional disciplinary action up to and including dismissal, expulsion, and/or criminal prosecution. If there is evidence indicating a user is engaged in activities which may pose an imminent threat to the health and safety of another or adversely affects the availability, confidentiality, or integrity of data on institution systems and information technology resources, the Vice President for Information Technology, in consultation with one or more members of IT leadership, may authorize the suspension of a user’s privileges until the incident is properly examined and resolved. Executive leadership, including the Chief Human Resources Officer, will be notified of these incidents.

Acknowledgement of Policy

By use of any technology-related resource, users agree to comply with this and all other information security-related policies.

Users shall:

  • Access only systems and information technology resources they have been authorized to use.
  • Use systems and information technology resources for authorized purposes only.
  • Use only account credentials they have been provided, maintain the confidentiality of those credentials, and protect them from unauthorized use.
  • Act ethically and responsibly to ensure the availability, confidentiality, and integrity of systems and information technology resources.
  • Comply with licenses, copyrights, contracts, and applicable laws for restricted or proprietary information.
  • Be responsible for the use of shared information technology resources and exercise good judgment regarding the reasonableness of personal use.
  • Exercise extreme caution when using electronic communication systems, such as email, in order to prevent fraudulent activities, compromise of systems from malicious software (malware), and/or unintentional exposure of data.
  • Utilize encryption to protect the confidentiality of data within the scope of the Family Educational Rights and Privacy Act of 1974 (FERPA), Health Insurance Portability and Accountability Act of 1996 (HIPAA), The Federal Information Security Management Act (FISMA), and other applicable data security and privacy laws.
  • Abide by all information security policies, standards, and procedures and review documentation updates to maintain compliance.
  • Read and complete the New Employee Technology Overview within seven business days if hired by the institution.
  • Respect the rights of others.
  • Do no harm.

Guidance on Unacceptable Use

Under no circumstance is a user authorized to use a Georgia Highlands College system or information technology resource for any activity that is illegal under local, state, federal, or international law.

The following are examples of activities that the institution defines as unacceptable use and are prohibited. This list, while not comprehensive, provides general guidance for the purpose of determining activities that may constitute unacceptable use.Users shall not:

  • Intentionally corrupt, destroy, misuse, or commit theft of any application software, system, or other information technology resource.
  • Use or attempt to access another individual’s accounts or attempt to circumvent security measures in place on any institution system or information technology resource.
  • Create or distribute unauthorized copies of copyrighted materials or software owned and/or licensed by the institution.
  • Use any web service, peer-to-peer file sharing service, or any other application software that significantly affects the performance of institution computers or information technology resources.
  • Engage in any activity unrelated to their job functions or a legitimate academic purpose that may pose a potential security risk or disrupts/damage systems and information technology resources.
  • Establish an independent electronic system or information technology resource for use by students, faculty, staff, and/or guests without explicit approval from Information Technology.
  • Disclose their account credentials to anyone else, including household members.
  • View pornography or distribute pornographic material using institution systems or information technology resources.
  • Threaten, harass, intimidate, or otherwise contact another individual using institution systems or information technology resources in violation of harassment or hostile workplace laws.
  • Provide information that would be generally considered harmful or an invasion of privacy (per FERPA) about Georgia Highlands College faculty, staff, or students to parties outside of Georgia Highlands College.
  • Use Georgia Highlands College systems or information technology resources, including email, for political campaigning, commercial advertising, or any other activity for personal gain.v

Need access to a GHC service?


D2L logo

D2L Course Access

outlook logo

Student Email

graduation cap

SCORE