Skip to Main Content
Although the University may entrust you with the use of voice-mail, e-mail, computer files, software, or similar University property, you should keep in mind that these items have been installed and maintained at great expense to the University and are only intended for business purposes. At all times, they remain University property. Likewise, all record files, software, and electronic communications contained in these systems are also property of the University.
You are advised that the following are not private: electronic files, records and communications on the University computer systems, electronic communication systems, or University telecommunications equipment. Although they are a confidential part of the University’s property, you should not use this equipment or these systems for confidential messages. The use of passwords to limit access to these systems is only intended to prevent unauthorized access to voice mail, e-mail, computer systems, files, and records. Additionally, these systems are subject to inspection, search, and/or monitoring by University personnel for any number of business reasons. Accordingly, these systems and equipment should not be used to transmit personal messages, except in necessary situations or when exceptions are specifically sanctioned by management. Voice-mail messages and e-mail messages should be routinely deleted when no longer needed.
You should be advised to use voice mail and e-mail as cautiously as you would use any more permanent communication medium such as a memorandum or letter. You should realize that e-mail messages:
To protect the University and to maintain network resources:
There will be times when you are unavailable, but the University, in order to conduct business, will utilize its ability to access your e-mail, voice-mail, computer files or software, or other University property. The University also may inspect the contents of your voice-mail, e-mail, computers, computer files, or software to monitor job performance, for training or quality control purposes, or when the University suspects that University property is being used in an unauthorized manner. You will be notified when this has occurred.
You are responsible for what happens at your workstation, under your password. The University recommends that you refrain from giving your password to colleagues or student workers.
It is reasonable to assume that some Faculty/Staff may use campus technology in ways that are illegal or that violate provisions of the Faculty Handbook. Such behaviors are prohibited and should be reported immediately. Whereas an exhaustive list of such behaviors would be impossible to generate, the following are specific examples of prohibited behavior: