Purpose
This policy provides guidance on the responsibilities of Volunteer State Community College regarding all non-Vol State owned/leased computing devices that a Vol State employee, student, potential/prospective student, or other guest brings to any Vol State institutional site.
Definitions
For the purposes of this policy, the following definitions shall apply:
- Computing Device – any physical or virtual electronic device that uses a processor to execute instructions and/or perform calculations. This includes, but is not limited to, desktop/laptop computers, servers, tablets/iPads, mobile/cellular telephones, smartphones, phablets, ultra-mobile PCs, mini PCs, mini PC sticks, handheld gaming devices, gaming consoles, E-readers, smart watches, and other specialized devices capable of processing data.
Policy
- The following provisions apply to any computing device that a user brings to any Vol State campus location:
- Vol State shall not be held liable for damage to or loss of non-Vol State owned/leased computing equipment belonging to, or under the control of, any user.
- Vol State is under no obligation to provide any hardware or software support for non-Vol State owned/leased computing equipment. This includes, but is not limited to, use, installation, troubleshooting, patching, upgrading, or configuration of the computing equipment, its operating system, or other user software.
- Where available, users may connect their non-Vol State owned/leased computing equipment to the Vol State network via wireless access after properly authenticated using their logon credentials.
- Users understand they are required to comply with all policies published Vol State and the Tennessee Board of Regents (TBR).
- Users shall not:
- Install or execute on their computing equipment any Vol State-licensed software without express written permission from the Vol State Chief Information Officer (CIO) or as specified in the End User License Agreement (EULA).
- Directly connect any non-Vol State owned/leased computing equipment to any Vol State network or peripheral equipment (e.g., printer, scanner, etc.) without express written permission from the CIO, except as otherwise permitted in this policy.
- The CIO or their designee has the final authority to interpret the terms of this policy. The CIO or their designee may grant exceptions to this policy, in writing, based on an evaluation of the risks versus the benefits.
TBR Source: n/a
VSCC Source: September 1, 1983, President’s Cabinet; February 29, 2008, President’s Cabinet; August 13, 2025, President’s Cabinet.



