Wi-Fi for Guests
Our guest Wi-Fi network is provided as a free, rate-limited service and at the sole discretion of Georgia Highlands College. By using this network, you agree to the Georgia Highlands College Acceptable Use Policy and Standard below. Violation of these policies will result in your access being disconnected, suspended, and/or permanently revoked.
This Wi-Fi network is not private or secured and users should have no expectation of privacy. Communications over this network are subject to monitoring by Georgia Highlands College, the institution’s Internet service provider(s), and the Board of Regents of the University System of Georgia.
GHC Students: Connect to GHC-Student for faster, more secure Wi-Fi access. Use your GHC Single Sign-On (SSO) account to connect to this network. Your username is your student email address.
Acceptable use of Georgia Highlands College systems and information technology resources requires that users behave ethically and with academic integrity. Users must respect intellectual property and ownership of content and agree to comply with institution policies, procedures, regulations, and guidelines. Users must also act responsibly, respect others’ rights to privacy and freedom from intimidation and harassment, and do their part to maintain the security and integrity of these resources.
Privacy
Georgia Highlands College makes every effort to protect the privacy of information on institution systems and networks. The institution reserves the right to take appropriate actions necessary to protect the integrity and security of these assets. This includes the right to monitor and record user activity on systems, networks, and workstations and immediately disconnect any device that is causing disruption or being used in violation of any policies or laws. In addition, if it is determined that an individual may be in violation of the law or Georgia Highlands College policies, his or her institution-issued device(s), accounts, records, and logs will be subject to review and analysis with approval of the Executive Leadership Team. Information contained on equipment or passing over campus networks, including but not limited to electronic communication, is subject to monitoring and examination. This information may also be disclosed for audit, legal, open records requests, or other management purposes.
Enforcement
Inappropriate use may result in the loss of system and information technology resource privileges and may include additional disciplinary action up to and including dismissal, expulsion, and/or criminal prosecution. If there is evidence indicating a user is engaged in activities which may pose an imminent threat to the health and safety of another or adversely affects the availability, confidentiality, or integrity of data on institution systems and information technology resources, the Chief Information Officer, in consultation with one or more members of IT leadership, may authorize the suspension of a user’s privileges until the incident is properly examined and resolved. Executive leadership, including the Chief Human Resources Officer, will be notified of these incidents.
Full Text
Please refer to the GHC Policy and Procedure Manual for the full IT Acceptable Use policy.
Users are required to abide by the following standards of appropriate and ethical use. Users shall:
- Access only systems and information resources they have been authorized to use.
- Use systems and information technology resources for authorized purposes only.
- Use only account credentials they have been provided, maintain the confidentiality of those credentials, and protect them from unauthorized use.
- Act ethically and responsibly to ensure the availability, confidentiality, and integrity of systems and the data that may be created, processed, transmitted, or stored on them.
- Comply with licenses, copyrights, contracts, and applicable laws for restricted or proprietary information.
- Exercise due care when using electronic communication systems, such as email, in order to prevent financial fraud, compromise of systems from malicious software (malware), and/or unintentional exposure of data.
- Classify and handle data in accordance with the IT Data Classification and Security policy (IT.PO.240).
- Abide by all information security policies, standards, and procedures and promptly review updates to these documents when they are published.
- Respect the rights of others.
- Do no harm.
Guidance on Unacceptable Use
Under no circumstance is a user authorized to use a Georgia Highlands College system or information technology resource for any activity that is illegal under local, state, federal, or international law. The following are examples of activities that GHC defines as unacceptable use and are prohibited. This list, while not comprehensive, provides general guidance for the purpose of determining activities that may constitute unacceptable use.
Users shall not:
- Intentionally misuse, corrupt, destroy, or commit theft of any application software, system, or other information technology resource.
- Disclose their account credentials to anyone else (including family members) or attempt to access a system with another user’s credentials.
- Attempt to exploit a security flaw or circumvent security measures in place on any system or information technology resource unless explicitly authorized to do so by the Chief Information Officer (CIO) or Chief Information Security Officer (CISO) in accordance with the IT Risk Management Plan.
- Create or distribute unauthorized copies of copyrighted materials or software owned and/or licensed by the institution.
- Intercept telephone communications, data network traffic, or attempt to access or copy another user’s electronic mail, data, programs, or other files unless acting in an official capacity as a member of the Division of Information Technology.
- Use official GHC email systems to disrupt operations, distribute disinformation, or adversely affect the reputation of the institution.
- Use any web service, peer-to-peer file sharing service, or any other application software that significantly affects the performance of institution computers or information technology resources.
- Engage in any activity unrelated to their job functions or a legitimate academic purpose that is likely to disrupt access to systems and data.
- Establish an unauthorized subnetwork or independent information system or communications network for use by students, faculty, staff, and/or guests without explicit approval from Information Technology.
- View pornography or distribute pornographic material using GHC systems or information technology resources.
- Threaten, harass, or intimidate another individual.
- Provide information that is harmful or an invasion of privacy about Georgia Highlands College employees or students to third parties who are not authorized to receive it.
- Use systems or information technology resources, including email, for political campaigning, commercial advertising, or personal gain.
Full Text
Please refer to the GHC Policy and Procedure Manual for the full IT Acceptable Use standard.