RVC competes in NJCAA Division III in men's and women's basketball, women's volleyball, golf, baseball, softball, men's and women's tennis, and men's and women's soccer. Not to brag, but we're pretty good at it. Our teams have won 13 national championships and we have had more than 140 All-Americans.
Whether your plan is to take classes and transfer to a four-year university or enter one of our career programs designed to get you into the workforce right away, Rock Valley College has what you are looking for. Select from one of our more than 60 transfer areas or more than 30 career programs.
Whether you are new to the college or know your way around, we have a variety of services designed to help you succeed. We're here for you every step of the way.
At Rock Valley College, you're not just a number. Our highly respected faculty have master's degrees, doctorates and real-world experience. You won't be competing for attention in a huge lecture hall. Our average class size is 21, so you'll get a chance to interact, challenge and be challenged by your instructors.
The Estelle M. Black Library at Rock Valley College features over 91,000 book volumes and more than 650 periodicals, and access to the interlibrary loan system. It also features spaces for individual and group study, and if you get thirsty, there's a coffee shop in the lobby!
Have fun. Try stuff. RVC gives you opportunities to get involved. There are lots of student activities to choose from. We offer more than 20 clubs and organizations. Try your hands at student government. Join the staff of our campus newspaper. What's it going to be?
Since RVC continually evaluates programs and course content, information contained on this website should be interpreted only as an overview, not as a contractual agreement between RVC and the student. RVC reserves the right to cancel classes as it deems necessary and to change curricula without notice.
Rock Valley College does not discriminate on the basis of race, color, religion, gender, national origin, ancestry, age, marital status, sexual orientation, physical or mental disability or unfavorable discharge from military service. This policy governs the recruitment and admission of students, the recruitment and employment of faculty and staff and the operation of any of the college's programs and activities as specified by federal laws and regulations. It is also the policy of Rock Valley College that no student or employee shall be subjected to sexual harassment, which is regarded as a form of discrimination.
Rock Valley College maintains Information Technology (IT) systems (voice, video and data hardware and software resources) in support of the Colleges mission. This procedure exists to protect the rights and privileges of the users of the IT systems, to ensure compliance with all applicable laws and regulations, and to safeguard Rock Valley College and its resources. All Information Technology systems and resources are to be used only in accordance with the rules and procedures identified herein. It is the responsibility of all users of College IT systems to be familiar with, understand and comply with this procedure. Examples are provided for illustrative purposes, but are not necessarily exhaustive.
The Rock Valley College Information Technology systems (voice, video and data hardware and software resources) are to be used only by those individuals authorized to do so by approval of the Managing Director of Information Technology or designee. It is the responsibility of all users of College IT systems to safeguard their passwords and their use of such systems. The College reserves the right to regulate the content of, and connections to, its IT systems. Inappropriate use of the Colleges IT systems is prohibited; examples include:
unauthorized use, attempted use, or manipulation of Rock Valley College telephones and telephony systems, including the abuse of dial-up, wireless networks, televisions, microwave or video systems, computers, computer facilities, networks, systems, software programs and systems, or data; and
attempting to thwart or disrupt the operation of College business through manipulation of the security of IT systems.
Usage of the Microwave System should be used in conjunction with the EBS guidelines.
Users have no expectation of privacy in connection with their use of IT systems, except where a users confidential information or usage is otherwise protected by federal or state law (e.g., FERPA, HIPAA). The College has discretion to monitor use of its IT systems with or without notice to users, consistent with federal or state laws and regulations. Documents, email messages and other files that are deleted by users may nonetheless be archived by the College, which has a right to subsequently retrieve such material, except where protected by federal or state law. Individual users investigating, reading or accessing the private files of other users without appropriate authorization are in violation of privacy guidelines. Examples include:
accessing or attempting to access another user's computer files without permission of the owner or by authorization of ones supervisor; and
supplying or attempting to supply false or misleading information or identification in order to access another user's computer files.
Technology-related theft is expressly forbidden. Examples include:
the unauthorized removal or attempted removal of Rock Valley College information technology resources (hardware, software, data, etc.); and
copying or attempting to copy data or software without proper authorization by the Office of Information Technology.
Alteration or attempted alteration of information technology resources, including IT hardware, software, data, or other files, or network destruction or disruption, is considered vandalism. Examples include:
sending mail, files, or programs which will inordinately replicate, inflict viruses, or otherwise do damage to another user's account;
tampering with or obstructing the operation of information technology systems, including attempts to crash systems;
inspecting, modifying, or distributing data or software, or attempting to do so, without proper authorization;
interfering or attempting to interfere with the performance of information technology systems; and
damaging or defacing IT hardware or software.
The redistribution of any software, videography or copyrighted material in electronic format is prohibited, except in the case of material which is clearly marked as being public or freely distributable or material which is covered by the “Fair Use Doctrine”. Users who redistribute software owned by or licensed to Rock Valley College without authorization from the Office of Information Technology violate agreements with software suppliers, as well as applicable federal copyright, patent and trade secret laws. Examples include:
copying, transmitting, or disclosing data, software, documentation, or attempting to do so, without proper authorization.
All use of College IT systems must conform to all federal and state laws prohibiting workplace harassment (including Title VII, Title IX, and the Illinois Human Rights Act). Harassment of other users of information technology systems can involve the sending of unsolicited, unwanted or non-work related messages or files, singly or repeatedly. Examples include:
interfering or attempting to interfere with the legitimate work of another user;
sending abusive or obscene messages via computer networks; and
attempting to use information technology resources to engage in the abuse of other users.
All authorized Rock Valley College users will adhere to the Rock Valley College Web Page Policy. Violations would include:
sending chain letters, or sending mass mailings not authorized by designated College personnel;
use of the information technology systems for personal advertisements or personal profit, except as authorized by designated College personnel;
intentionally using information technology resources to access materials or participate in communications that are abusive, unethical, violations of privacy, obscene or pornographic.
unauthorized and time-consuming recreational activities and game playing;
using network accounts for work not authorized for that account;
engaging in disruptive behavior in college computer labs;
using the information technology systems for any illegal purposes;
use of software or hardware not properly licensed or authorized by the Office of Information Technology, or found to be in conflict with other IT systems, or altering system configurations; and
knowingly using information technology resources (including printers) to pursue personal matters that are distinct from RVC-related student assignments or distinct from assigned job duties and responsibilities, except where such use is minimal and infrequent in nature, does not otherwise violate provisions herein, and has inconsequential financial impact.
All requests for clarifications or interpretations of this procedure should be directed to the Managing Director of Information Technology. RVC students believed to be in violation of this procedure will be referred to the student disciplinary procedure; employees believed to be in violation will be referred to employee disciplinary procedures consistent with applicable College policies and contractual obligations. All other presumed violators will be handled on a case-by-case basis.