072.1 Electronic Messaging

Created by: Stephanie Ferguson on Sep 29 2005 12:00:00:000AM
Category: 0 - General Administration; 70 - Computer Services
 
Originator: President
Current File: 072.1
Adoption Date: Apr 20 2011 12:00:00:000AM
Reviewed for Currency: Apr 20 2011 12:00:00:000AM
 
Replaces File: 072.1
Date of Origin: Mar 23 1994 12:00:00:000AM
 
Classification: Faculty; Personnel
 
In Archive? 0


072.1 Electronic Messaging

 

A. Background

Furman University provides electronic messaging and collaborative tools, as well as network resources for the use of faculty, staff, students and others.  This policy outlines appropriate expectations and usage inside and outside the university community.

 

B. Policy

These resources are provided to facilitate valid educational and administrative activities. Standards of conduct for electronic messaging conform to those standards of conduct outlined in the Helmsman, the Faculty Handbook, and the Policies and Procedures Manual.

 

C. Guidelines

1.   Electronic mail messages or postings must meet the same standards for distribution or display as any other campus communication. Users are free to publish their opinions, but sources of such opinions must be clearly and accurately identified.

 

2.   Users should be aware that no system has yet been devised that cannot be compromised.  Users should never assume    that electronic mail messages will be private and confidential. System administrators may, from time to time, find it technically necessary to look at any data files in any electronic mail account in order to maintain system functionality. Any information obtained will be held in absolute confidentiality unless evidence is discovered indicating activity prohibited in this policy, the Helmsman, the Faculty Handbook, or the Policies and Procedures Manual. Therefore, users not wanting certain information viewed by others should not store such information in their electronic mail account nor in the electronic messaging system.

 

3.   Persons violating university guidelines and policies concerning the appropriate use of Furman University resources, will be disciplined by the normal and appropriate university oversight body (i.e., University Disciplinary Committee, faculty committee, or administrative officer). Penalties may include but are not limited to verbal or written warning, disciplinary probation, temporary access denial, permanent access revocation, disciplinary suspension or dismissal.

 

4.   The Chief Information Officer or the Director of Systems and Networks may, at their own discretion, and without notice, temporarily disable any account which is believed to be the source of mail messages or postings which are disrupting normal operation of the university's information technology resources.

 

5.   There are several activities that are expressly prohibited as inappropriate use of information technology resources at Furman:  Activities involving unprofessional, harassing, discriminatory, illegal and/or unethical behavior; Electronic messaging used for commercial gain or personal profit without written permission by the appropriate vice president and approval by the Chief Information Officer; Forgery of messages; Hacking or otherwise breaking into someone's files or stealing their password;  infringement of copyright law; Providing unauthorized access to copyrighted materials;  Origination or forwarding of "chain letters," defined as a letter sent to several persons with a request that each send copies to several persons with the same, or similar request; and any activity that significantly prevents or inhibits the conduct of university academic or administrative work.

 

6.   The Chief Information Officer or the Director of Systems and Networks may, at the request of the President, the Assistant Vice President of Human Resourcesl, or the Director of University Police, or as required by law, assist in the investigation of activities involving prohibited activities by examining the contents of electronic messages stored in or passing through any electronic messaging system owned by or under the control of the university for any purpose at any time.

 

 

 

...........................

072.1 Electronic Messaging

072.1 Electronic Messaging

Created by: Stephanie Ferguson on Sep 29 2005 12:00:00:000AM
Category: 8 - Human Resourcesl; 30 - Employee Relations/Communications
 
Originator: President
Current File: 072.1
Adoption Date: Apr 20 2011 12:00:00:000AM
Reviewed for Currency: Apr 20 2011 12:00:00:000AM
 
Replaces File: 072.1
Date of Origin: Mar 23 1994 12:00:00:000AM
 
Classification: Faculty; Personnel
 
In Archive? 0


072.1 Electronic Messaging

 

A. Background

Furman University provides electronic messaging and collaborative tools, as well as network resources for the use of faculty, staff, students and others.  This policy outlines appropriate expectations and usage inside and outside the university community.

 

B. Policy

These resources are provided to facilitate valid educational and administrative activities. Standards of conduct for electronic messaging conform to those standards of conduct outlined in the Helmsman, the Faculty Handbook, and the Policies and Procedures Manual.

 

C. Guidelines

1.   Electronic mail messages or postings must meet the same standards for distribution or display as any other campus communication. Users are free to publish their opinions, but sources of such opinions must be clearly and accurately identified.

 

2.   Users should be aware that no system has yet been devised that cannot be compromised.  Users should never assume    that electronic mail messages will be private and confidential. System administrators may, from time to time, find it technically necessary to look at any data files in any electronic mail account in order to maintain system functionality. Any information obtained will be held in absolute confidentiality unless evidence is discovered indicating activity prohibited in this policy, the Helmsman, the Faculty Handbook, or the Policies and Procedures Manual. Therefore, users not wanting certain information viewed by others should not store such information in their electronic mail account nor in the electronic messaging system.

 

3.   Persons violating university guidelines and policies concerning the appropriate use of Furman University resources, will be disciplined by the normal and appropriate university oversight body (i.e., University Disciplinary Committee, faculty committee, or administrative officer). Penalties may include but are not limited to verbal or written warning, disciplinary probation, temporary access denial, permanent access revocation, disciplinary suspension or dismissal.

 

4.   The Chief Information Officer or the Director of Systems and Networks may, at their own discretion, and without notice, temporarily disable any account which is believed to be the source of mail messages or postings which are disrupting normal operation of the university's information technology resources.

 

5.   There are several activities that are expressly prohibited as inappropriate use of information technology resources at Furman:  Activities involving unprofessional, harassing, discriminatory, illegal and/or unethical behavior; Electronic messaging used for commercial gain or personal profit without written permission by the appropriate vice president and approval by the Chief Information Officer; Forgery of messages; Hacking or otherwise breaking into someone's files or stealing their password;  infringement of copyright law; Providing unauthorized access to copyrighted materials;  Origination or forwarding of "chain letters," defined as a letter sent to several persons with a request that each send copies to several persons with the same, or similar request; and any activity that significantly prevents or inhibits the conduct of university academic or administrative work.

 

6.   The Chief Information Officer or the Director of Systems and Networks may, at the request of the President, the Assistant Vice President of Human Resourcesl, or the Director of University Police, or as required by law, assist in the investigation of activities involving prohibited activities by examining the contents of electronic messages stored in or passing through any electronic messaging system owned by or under the control of the university for any purpose at any time.

 

 

 

...........................