Warrior Wireless
Student Services

Warrior Wireless

Use the instructions below to register your device(s) to enjoy wireless access at any location!

Available at Ina, MarketPlace and Pinckneyville Campuses

warrior-wirless-media-hero-620x498

Students

*Note - You must have a warriormail account to use warrior-wireless. If you do not have an account, please use instructions for guests.*

1. Connect directly to Warrior-Wireless SSID using your phone, tablet or laptop by enabling your wireless adapter, scanning for open connections, selecting Warrior-Wireless

2. Username: This is your MyRLC / WarriorMail username / address
    Password: Same as for MyRLC / WawrriorMail

Acceptable Usage Policy

Rend Lake College provides wireless access subject to the following Acceptable Usage Policy, which may be updated periodically. This policy outlines acceptable use of the Rend Lake College wireless service, as well as permissible and prohibited conduct for using the service to access the Internet.

It is the responsibility of all who access Rend Lake College’s wireless network ("users," "you," or "your"), to comply with all Rend Lake College wireless policies.

It is the responsibility of the wireless network user to install software to protect personal devices from external threats such as viruses, spam, and other methods of intrusion.

Rend Lake College reserves the right to immediately terminate a user’s access to the wireless service if the user engages in any of the prohibited activities listed in this AUP or if the service is used in a way which is contrary to the policies of Rend Lake College or any of Rend Lake College’s bandwidth providers.

Prohibited Uses & Activities
Prohibited uses include, but are not limited to, using the service, customer equipment, or Rend Lake College’s wireless equipment to:
  1. undertake or accomplish any unlawful purpose. This includes, but is not limited to, posting, storing, transmitting or disseminating information, data or material which is libelous, obscene, unlawful, threatening, or defamatory; which infringes the intellectual property rights of any person or entity; or which in any way constitutes or encourages conduct that would constitute a criminal offense, give rise to civil liability, or otherwise violate any local, provincial, federal or international law, order or regulation;
  2. post, store, send, transmit, or disseminate any information or material which a reasonable person could deem to be objectionable, offensive, indecent, pornographic, harassing, threatening, embarrassing, distressing, vulgar, hateful, racially or ethnically offensive, or otherwise inappropriate, regardless of whether this material or its dissemination is unlawful;
  3. access any other person's computer or computer system, software, or data without their knowledge and consent; breach the security of another user; or attempt to circumvent the user authentication or security of any host, network, or account. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security rights of other hosts, networks, or accounts;
  4. use or distribute tools designed or used for compromising security, such as password guessing programs, decoders, password gatherers, unauthorized keystroke loggers, analyzers, cracking tools, packet sniffers, encryption circumvention devices, or Trojan Horse programs. Network probing or port scanning tools are strictly prohibited. Special permission may be granted for Rend Lake College technology classes that incorporate wireless spectrum analysis and access point identification as part of their curriculum;
  5. upload, post, publish, transmit, reproduce, create derivative works of, or distribute in any way information, software or other material obtained through the service or otherwise that is protected by copyright or other proprietary right, without obtaining permission of the owner;
  6. copy, distribute, or sublicense any software provided in connection with the service by Rend Lake College or any third party;
  7. restrict, inhibit, or otherwise interfere with the ability of any other person, regardless of intent, purpose, or knowledge, to use or enjoy the service, including, without limitation, posting or transmitting any information or software which contains a worm, virus, or other harmful feature, or generating levels of traffic sufficient to impede others' ability to send or retrieve information;
  8. restrict, inhibit, interfere with, or otherwise disrupt or cause a performance degradation, regardless of intent, purpose or knowledge, to any Rend Lake College wireless (or Rend Lake College wireless supplier) host, server, backbone network, node or service, or facilities used to deliver the service;
  9. make available to anyone outside the premises the ability to use the service (i.e. Wi-Fi, or other methods of networking), in whole or in part, directly or indirectly, or on a bundled or unbundled basis, without Rend Lake College’s knowledge and agreement;
  10. transmit unsolicited bulk or commercial messages or "spam." This includes, but is not limited to, unsolicited advertising, promotional materials or other solicitation material, bulk mailing of commercial advertising, chain mail, informational announcements, charity requests, and petitions for signatures;
  11. send numerous copies of the same or substantially similar messages, empty messages, or messages which contain no substantive content, or send very large messages or files to a recipient that disrupts a server, account, newsgroup, or chat service;
  12. distribute programs that remove locks or time-outs built into software (cracks);
  13. run programs, equipment, or servers from the premises that provide network content or other services to anyone outside of the Local Area Network. Examples of prohibited services and servers include, but are not limited to, e-mail, web hosting, file sharing, and proxy services and servers;
  14. initiate, perpetuate, or in any way participate in any pyramid or other illegal soliciting scheme;
  15. participate in the collection of e-mail addresses, screen names, or other identifiers, a practice sometimes known as spidering or harvesting, or participate in the use of software (including spyware) designed to facilitate this activity;
  16. collect responses from unsolicited messages;
  17. impersonate any person or entity, engage in sender address falsification, forge anyone else's digital or manual signature, or perform any other similar fraudulent activity;
  18. service, alter, modify, or tamper with the Rend Lake College wireless equipment or service or permit any other person to do the same who is not authorized by Rend Lake College
  19. collect or attempt to collect, personal information about third parties without their consent;
  20. interfere with computer networking or telecommunications service to any user, host or network, including, without limitation, denial of service attacks, flooding of a network, overloading a service, improper seizing and abuse of operator privileges and attempts to "crash" a host; and
  21. violate the rules, regulations, or policies applicable to any network, server, computer database, or Web site that you access.
Security
In all cases, the user is solely responsible for the security of any personal device connected to the service, including any data stored or shared on that device. Rend Lake College recommends against enabling file or printer sharing unless you do so in strict compliance with all security recommendations and features provided by Rend Lake College and the manufacturer of the applicable file or printer sharing devices. Any files or devices made available for shared access on a home LAN, for example, should be protected with a strong password or as otherwise appropriated.

Information Technology
Phone: (618) 437-5321 Ext. 1259
Toll-free (In-District): 1-800-369-5321 Ext. 1259
Email: help-desk@rlc.edu
Address: 468 N. Ken Gray Parkway, Ina, IL 62846 Attn: IT Help Desk
Fax Number: (618) 437-5677 Attn: IT Help Desk