Skip to page body Home About Community Living Doing Business Browse by Topic I Want to... Your Government
Note: This Security Policy is subject to change without notice and reflects current GCC business practices. By using our website you are agreeing…

Glendale Community College (GCC) is committed to making sure that your personal information remains confidential. We have taken several steps to safeguard the integrity of our communications and computing infrastructure, including but not limited to password authentication, monitoring, auditing, and encryption.

Security measures have been integrated into the design, implementation, and day-to-day operations of the entire GCC business environment as part of our continuing commitment to risk management. We employ special security measures to protect your information - including User ID and password authentication, program "time-outs," and data encryption.

The GCC web site and computer systems are for legal and authorized use only. Unauthorized access, attempted access, or use of this or any related system is a violation of Section 502 of the California Penal Code and/or applicable federal law, and may be subject to prosecution. Individuals using this system without authority, or in excess of their authority, are subject to having their activities on the site monitored and recorded.

Privacy Policy

The information GCC provides on our web sites is made available for the convenient access of our students, employees and other interested parties. Electronic information privacy protection is crucial for the ongoing success of the Internet as a convenient means to provide customer service.

GCC is committed to responsible information handling practices. When you access or use our web site, you agree to the terms and conditions published here. Please note that the privacy policies or statements of other web sites linked to the GCC web site may differ. GCC is not responsible for the privacy practices of those sites.

To complete GCC customer business online, we sometimes need to coordinate efforts with other parties, such as the State Controller's Office, the Los Angeles County Office of Education, or various health plans. Information will be used only to conduct GCC-related business.

GCC has a responsibility to protect our computing resources. If we believe an attempt is being made through the Internet to break into or otherwise abuse our computer systems or business information, we will use the information in our computer logs, and other means available, to determine those responsible. As part of these legal efforts, we may share the information we gather with law enforcement agencies or other authorized entities.

Limitation of Liability

While GCC makes every attempt to ensure the information provided is reliable, human or mechanical error remains a possibility. Therefore, GCC does not guarantee the accuracy, completeness, timeliness, or correct sequencing of information, and will not be held responsible for any errors or omissions, or for the use of results obtained from the use of the information. This applies to any web sites linked to and from the GCC web site.

If there is a conflict between the information provided on this Web site and any applicable law, any decisions will be based on the law and not the information on this Web site.

Your Role in Security

Making sure your confidential information is secure is also an important responsibility for you. You're responsible for ensuring your personal password remains secure, so you should not reveal your password to anyone. If you believe an unauthorized person has gained access to it, you should change it immediately.

As part of good security practices, you should change your password regularly and never walk away from your computer if you're in the middle of a session. You should also review our Privacy Policy for more information.

About Encryption

Encryption is the electronic "scrambling" of information - kind of like a secret code. This protects information from being intercepted by a third party. GCC encrypts your Password in our computer systems.

Last updated: 5/25/2010 10:57:49 AM