Thursday, July 2, 2015

Uses of E-mail

Anonymity allowed
Exception: if it violates laws or other policies
Can’t interfere with others’ use of e-mail
No spam, letter bombs, e-mailed worms, etc.
Personal e-mail allowed within limits
Cannot interfere with university business

Such e-mail may be a “university record” subject to disclosure

Security of E-mail
University can read e-mail
Won’t go out of its way to do so
Allowed for legitimate business purposes
Allowed to keep e-mail robust, reliable
Archiving and retention allowed
May be able to recover e-mail from end system (backed up, for example)

Implementation

Adds campus-specific requirements and procedures
Example: “incidental personal use” not allowed if it benefits a non-university organization
Allows implementation to take into account differences between campuses, such as self-governance by Academic Senate
Procedures for inspecting, monitoring, disclosing e-mail contents
Backups


No comments:

Post a Comment