logo
INFORMATION TECHNOLOGY SERVICES

WSU Email Policy

Policies and Procedures Manual

Policy Relating to University Information Technology Systems

Relative to E-mail

Initiating Authority: General Counsel

Accountability: Vice President for Academic Affairs

Purpose: To state University policy with regard to the use of University information technology systems relative to E-mail

  1. Preamble

    Technology resources provided by Wichita State University are made available to students, faculty, staff and others primarily as tools for enhancing and facilitating teaching, learning, scholarly research, communications and the operation and administration of the University. Uses which are not directly related to these purposes shall be considered secondary activities and should such secondary activities in any way interfere with the primary activities, access to University technology resources may be terminated immediately. Access to and usage of such resources is a privilege and is not a right; it is therefore deemed appropriate and necessary that certain guidelines for the usage of the E-mail component of the University's technology resources be set forth and explained.
     
  2. Policy Statement
    1. Computers and other electronic media are the property of Wichita State University and should be used for the primary purpose of benefiting, enhancing and furthering the mission of the University.
       
    2. By using University-supplied information technology facilities and resources, individuals and other entities agree to abide by all applicable policies and procedures adopted by the University, the Kansas Board of Regents, the state of Kansas, and the usage guidelines of other networks linked to the University's networks or computer systems.
       
    3. By using University-supplied information technology facilities and resources, individuals and other entities agree to abide by and/or with current state and federal laws, including, but not limited to those relating to trademarks, service marks and copyright, defamation and discrimination.
       
    4. Users should understand that E-mail transmissions are considered to be non-confidential communications. E-mail transmissions may be subject to disclosure through legal proceedings or otherwise through various laws which may be held to apply to such transmissions.
       
    5. Users should understand that authorized University personnel must have access to E-mail and related information stored on University owned equipment. This access is required for reasons that include retrieving business-related information, trouble-shooting hardware and software problems, preventing unauthorized access and system misuse, assuring compliance with software distribution policies, and complying with legal and regulatory requests for information. The Executive Director of the University's computing center will be responsible for approving any such access.
       
    6. Users should understand that individual access to the University's information technology resources may be terminated at any time due to a violation of this policy.
       
    7. Users should understand that delivery of E-mail cannot be assured and that recovery of lost E-mail may not be possible.
       
    8. Users should respect the right of privacy of others and E-mail should not be used to harass, intimidate or interfere with the work of the recipients of E-mail.
       
    9. Users should refrain from acts that waste University resources and prevent others from using the University's information technology resources in accord with this policy.
       
    10. E-mail should not be used for private (does not include or cover consulting activities pursued in accord with applicable University policies) or commercial gain, posting of chain letters, posting or mailing of obscene materials, representing oneself electronically as another user, or configuring hardware or software to intentionally allow access by unauthorized users.
       
    11. Users should understand that the University's information technology resources are intended to facilitate the work of the University and personal usage by Users should be limited and should not interfere with or delay University matters.
       
  3. Implementation

    The Executive Director of University Computing shall have primary responsibility for the publication and implementation of this University policy.
     
  4. Effective Date

    This policy shall become effective as of March 17, 1998.