•Anonymity
allowed
–Exception: if it violates laws or
other policies
•Can’t
interfere with others’ use of e-mail
–No spam, letter bombs, e-mailed
worms, etc.
•Personal
e-mail allowed within limits
–Cannot interfere with university
business
–Such e-mail may be a “university
record” subject to disclosure
Security of E-mail
•University can read e-mail
–Won’t go out of its way to do so
–Allowed for legitimate business purposes
–Allowed to keep e-mail robust, reliable
•Archiving and retention
allowed
–May be able to recover e-mail from end system (backed up, for
example)
Implementation
•Adds
campus-specific requirements and procedures
–Example: “incidental personal
use” not allowed if it benefits a non-university organization
–Allows implementation to take
into account differences between campuses, such as self-governance by Academic
Senate
•Procedures
for inspecting, monitoring, disclosing e-mail contents
Backups
No comments:
Post a Comment