Information for Students

Minimum Technology Requirements for Students


A working computer with speakers

Access to a reliable internet connection

Google Chrome or Firefox as an internet browser (We cannot endorse the reliability of Internet Explorer, Edge, Opera, or any other browser not listed.)


Any note-taking material you may need

Student Registration and Scheduling Information

Students may register for classes in-person at: 8301 Joliet Street, Hudson Fl.

Over the phone with one of our student counselors

Via our store at: 

(You will be emailed with your course access                   information at the time of registration.)

Class Schedules are listed in our brochure and are available upon request or here on our website!

Information Security Policy

User Security

  • Authentication: User data in our system is logically segregated by account-based access rules. User accounts have unique usernames and passwords that must be entered each time a user logs on. 

  • Passwords: User application passwords are stored internally hashed and are accessible on a need-to-know basis.

  • Data Encryption:
    Certain sensitive user data, such as credit card details and account passwords, are stored and transmitted in encrypted format and processed through a third-party entity (Paypal).

  • Privacy:
    It is the policy of the Contractors Institute to never sell student information or any collected information with student identities attached. 

  • Data Residency:
    All Contractors Institute data is backed up via geographically disparate data centers on a regular basis.

Physical Security

All Contractors Institute information systems and infrastructure that are locally installed are located in locked and monitored areas that are regularly checked for intrusion attempts.

  • Power:
    Internal servers have redundant internal and external power supplies.

  • Uptime:
    Continuous uptime monitoring, with immediate escalation to our ISP in the event of a failure.

  • Backup Frequency:
    Backups occur weekly at multiple geographically disparate sites.

Network Security


  • Testing: System functionality and design changes are verified in an isolated test “sandbox” environment and subject to functional and security testing prior to deployment to active production systems.

  • Firewalls:
    Contractors Institute network security includes an external gateway with an active firewall attached.

  • Access Control:
    Secure VPN, 2FA (two-factor authentication), and role-based access is enforced for systems management by authorized engineering staff.

  • Logging and Auditing:
    Central logging systems capture and archive all internal systems access including any failed authentication attempts.

Vulnerability Management


  • Patching:
    Latest security patches are applied to all operating systems, applications, and network infrastructure to mitigate exposure to vulnerabilities.

Technical Support

Technical Support is available: 

Monday - Friday: 8am - 4pm
Saturday: 8am-12pm

Proprietary Interests / Intellectual Property Rights

Copyright & Trademarks

  • All rights reserved. All content (texts, trademarks, illustrations, photos, graphics, files, designs, arrangements etc.) on this website of the Contractors Institute are protected by copyright and other protective laws. The contents of this website are to be used only in accordance with Internet regulations.

Internet regulations.

Without the explicit written permission of the Contractors Institute it is prohibited to integrate in whole, or in part, any of the protected contents published on these websites into other programs or other web sites or to use them by any other means. This website can contain elements that are protected by copyright and by other laws that are subject to the copyright or other rights of third parties and that are correspondingly protected for these third parties.


The Contractors Institute has carefully compiled the contents of this website in accordance with their current state of knowledge. Access to and use of this website, as well as web sites related or connected to this by links, are at the user's own risk and responsibility. Damage and warranty claims arising from missing or incorrect data are excluded. The Contractors Institute bears no responsibility or liability for damage of any kind, also for indirect or consequential damages resulting from access to or use of this website or websites related or connected to this by links.

Links to other websites

The Contractors Institute website can contain links (cross references) to websites that are run by third parties. The Contractors Institute takes no responsibility for the content of these other websites.

Organizational & Administrative Security

  • Employee Screening: We perform background screening on all employees, to the extent possible within our technological capabilities.

  • Training: We provide ongoing security and technology use training for employees.

  • Access: Access controls to sensitive data in our databases, systems, and environments are set on a need-to-know / least privilege necessary basis.

Handling of Security Breaches

Despite best efforts, no method of transmission over the Internet and no method of electronic storage is perfectly secure. We cannot guarantee absolute security. Our breach notification procedures are consistent with our obligations under various state and federal laws and regulation, as well as any industry rules or standards that we adhere to.

Your Responsibilities

Keeping your data secure also depends on you ensuring that you maintain the security of your account by using sufficiently complicated passwords and storing them safely.

Contractors Institute