072.1 Electronic Messaging
|Created by: Stephanie Ferguson on 9/29/2005|
|Category: 0 - General Administration; 70 - Computer Services, 8 - Human Resources; 30 - Employee Relations/Communications|
|Current File: 072.1|
|Adoption Date: 4/20/2011|
|Reviewed for Currency: 4/20/2011|
|Replaces File: 072.1|
|Date of Origin: 3/23/1994|
|Classification: Faculty; Personnel|
|In Archive? No|
072.1 Electronic Messaging
These resources are provided to facilitate valid educational and administrative activities. Standards of conduct for electronic messaging conform to those standards of conduct outlined in the Helmsman, the Faculty Handbook, and the Policies and Procedures Manual.
1. Electronic mail messages or postings must meet the same standards for distribution or display as any other campus communication. Users are free to publish their opinions, but sources of such opinions must be clearly and accurately identified.
2. Users should be aware that no system has yet been devised that cannot be compromised. Users should never assume that electronic mail messages will be private and confidential. System administrators may, from time to time, find it technically necessary to look at any data files in any electronic mail account in order to maintain system functionality. Any information obtained will be held in absolute confidentiality unless evidence is discovered indicating activity prohibited in this policy, the Helmsman, the Faculty Handbook, or the Policies and Procedures Manual. Therefore, users not wanting certain information viewed by others should not store such information in their electronic mail account nor in the electronic messaging system.
3. Persons violating university guidelines and policies concerning the appropriate use of
4. The Chief Information Officer or the Director of Systems and Networks may, at their own discretion, and without notice, temporarily disable any account which is believed to be the source of mail messages or postings which are disrupting normal operation of the university's information technology resources.
5. There are several activities that are expressly prohibited as inappropriate use of information technology resources at Furman: Activities involving unprofessional, harassing, discriminatory, illegal and/or unethical behavior; Electronic messaging used for commercial gain or personal profit without written permission by the appropriate vice president and approval by the Chief Information Officer; Forgery of messages; Hacking or otherwise breaking into someone's files or stealing their password; infringement of copyright law; Providing unauthorized access to copyrighted materials; Origination or forwarding of "chain letters," defined as a letter sent to several persons with a request that each send copies to several persons with the same, or similar request; and any activity that significantly prevents or inhibits the conduct of university academic or administrative work.
6. The Chief Information Officer or the Director of Systems and Networks may, at the request of the President, the Assistant Vice President of Human Resourcesl, or the Director of University Police, or as required by law, assist in the investigation of activities involving prohibited activities by examining the contents of electronic messages stored in or passing through any electronic messaging system owned by or under the control of the university for any purpose at any time.