Menu

Wireless Access Authorization Form

Wireless Access Authorization Form

Confidential

USER INFORMATION:

ID Type:
Patron Status:

NOTICE:

For your protection, sites visited on GCSC’s wireless network are being monitored and recorded. Continued usage of this system and your signature on this access request form constitutes awareness and acceptance of this fact. When using the wireless network, you agree to refrain from the following:

  • using the campus network resources for any illegal activity
  • violating the conditions of those codes relating to student rights to privacy
  • using profanity, obscenity, or other offensive language
  • deliberately displaying obscene pictures or text on the monitor or allowing such images or text to be printed on the institution’s printer
  • copying commercial software or other commercial materials (including music and movie files) protected by copyright law
  • using the institution’s network resources for financial gain
  • engaging in activities designed to deliberately obstruct others’ work
  • excessively using available network resources
  • deliberately causing a machine to crash
  • attempting to gain access to areas of any system for which authorized access has not been granted, i.e. "hacking"
  • engaging in activities that give simulated sign-off messages, public announcements, or other fraudulent system responses
  • engaging in activities that do not have academic merit, such as: storing files not related to academic activities, using peer-to-peer file sharing software and/or deliberately executing files that excessively utilize the system
  • giving away your user ID and/or password for any reason under any circumstance
  • fraudulently using someone else’s ID or password
  • having or attempting to change system control information, such as program status, protection codes, and accounting information
  • sending others material and then requesting them to send additional messages to others, i.e. chain letters
  • sending bulk ‘spam’ email or intentionally utilizing system resources to send such messages
  • unauthorized installation of any drivers, software, or hardware on campus computers
  • using the institution’s network to launch denial-of-service attacks against any computer or network

Violation of these policies can and will result in disciplinary action and/or prosecution. You are responsible for all activity that occurs on your user account. Gulf Coast State College and its employees disclaim any responsibility for anything that happens to your personal hardware and/or software while using our services. ALL wireless user accounts will be deleted after the Summer semester. New applications will be required to obtain wireless access for the subsequent academic year at the beginning of each Fall semester.

Please bring your picture ID with you when this form is turned in at the Library Help Desk.

You will be e-mailed your username and password after this form is processed by Information Technology Services

I have read and agreed to the above terms and conditions:

 
Top