Skip to content
The College of St. Scholastica

Services and Resources

Wifi Access

Storm’s Wireless Network is the College’s official wifi network. You will see this on your computer or mobile device’s available wifi networks to join when on-campus as “stormswirelessnet”. Our wireless network is available to students and employees with a valid network user id and password. Guests of the College can also register to access our network.

Instructions on How to Connect to the Storm’s Wireless Network

Web Conferencing

The College uses Zoom for its web-conferencing needs. All faculty, staff and students can read more about Zoom resources on my.CSS.

Hybrid Classrooms

The College’s Information Technologies Department supports a wide range of technology and services in the classrooms and beyond across all our campuses. The majority of our classrooms are equipped with projectors and displays, supporting both lecture and active learning. Classroom computers and cameras allow classes to be delivered in a hybrid format, providing access and flexibility for faculty and students.

Technology Requirements for Students

The College of St. Scholastica recommends the use of a computer or laptop that meets the standards below. There is a possibility that other systems may perform adequately, but may not be supported by our support staff. Tablets and mobile devices may lack some essential functionalities. The College will provide an email account that is accessible via the internet.

  • Minimum Recommended PC Requirements: Operating system Windows 10
  • Minimum Recommended Mac Requirements: macOS Sierra 10.12 (minimum) or newer

If you need Windows on your Mac, you will need to look at a software solution such as VirtualBox or Parallels.

Internet Connection

Students will need access to a reliable internet connection and the latest version of one of the following browsers:

Software/Hardware

  • Word processing program (certain courses or degree programs may require a specific processing program). The College provides Google Drive that can be used. Current students can also download Microsoft Office.
  • Additional software as required by specific courses or degree programs

Some programs with synchronous components may require you to have the following:

  • A computer with a USB-connected or built-in webcam
  • High-speed internet connection
  • Headset with microphone (USB connection recommended)

Policies

Email Policy

The primary purpose of the College’s email system is for correspondence relating to the mission of the College. Email is a resource provided to the College Community to enhance the performance and productivity of the College. The College Community recognizes that the hardware, software and network resources used by the email system as well as email correspondence are owned by the College.

Inappropriate Use of Email

  • Sending unsolicited email messages or newsgroup posts, including the sending of “junk mail” or other advertising material to individuals who did not specifically request such material (email spam)
  • Any form of harassment via email, telephone or paging, whether through language, frequency or size of messages
  • Unauthorized use or forging of email header information
  • Solicitation of email for any other email address other than that of the poster’s account, with the intent to harass or to collect replies
  • Creating or forwarding “chain letters”, “Ponzi” or other “pyramid” schemes of any type.
    Use of unsolicited email originating from within the College’s networks of other Internet/Intranet/Extranet service providers on behalf of, or to advertise, any service hosted by The College of St. Scholastica or connected via the College’s network.
  • Email communications are not considered private despite any such designation or functionality within the software application, either by the sender or the recipient. Access to the College’s email services is a privilege that may be wholly or partially restricted by the College without prior notice and consent of the email user when required by and consistent with the law when there is a substantiated reason to believe that violations of policy or law have occurred or, in time-sensitive cases when required to meet critical operational needs. The administrators of the College’s email system may, within certain limits, block mail including external, unsolicited, bulk email (spam) or viruses.

Privacy

  • Do not say anything you would not want others, besides your correspondent, to read. Messages meant to be confidential can be intercepted during or after transmission, and even deleted messages might have been stored on backup tapes. Users are advised not to send confidential College communications via email. The College will make every attempt to assure the security of the email system, however, this is not a guarantee.
  • The College does not monitor email communications as a matter of routine. However, Users understand and consent to any monitoring, interception, use or disclosure of email communications deemed necessary by the College in its discretion to investigate and enforce its Acceptable Use Policy, maintaining the integrity and efficient operation of The College’s systems or as may be required in connection with legal requests from governmental authorities.
  • The College can assure neither privacy of an individual user’s use of the email resources nor the confidentiality of particular messages that may be created, transmitted, received or stored.
    Backup copies may be retained for periods of time even if the user has deleted the message from his account.
  • IT members may, in the course of routine system maintenance, troubleshooting, upgrades, etc., inadvertently see the content of email messages.
    Email account holders are expected to comply with College requests for copies of email records in their possession that pertain to College business or whose disclosure is required to comply with applicable laws.
  • Email account holders may, under certain conditions, have email files accessed by others when it relates to College business
  • Do not send confidential information via emails such as social security numbers, account passwords, tax IDs or credit card numbers

Security of Email

  • Never open an attachment or click on a web link from a person that you do not know. Many phishing scams involve an infected attachment or web link that looks to be from a legitimate bank or financial institution.
  • Be aware of the potential for forged email. One example is that a person has acquired another individual’s password and that person pretends to be the other individual and sends a forged email.
  • Be extremely careful when executing programs you receive via email, as they may contain viruses that could be dangerous to the network, servers or your computer

Harassment

  • Users should be sensitive to the public nature of the shared computing facilities and take care to refrain from transmitting to others in any location inappropriate images, sounds or messages which might reasonably create an atmosphere of discomfort or be considered harassing

References