5.5.2 Email Systems

     A.  Privacy and Confidentiality

Jackson State University provides Email System resources to support the work of its mission.  Jackson State University will make reasonable efforts to maintain the integrity and effective operation of its email systems. Because of the nature and technology of electronic communication, the University cannot ensure the privacy of an individual’s use of the University’s Email System resources or the confidentiality of particular messages that may be created, transmitted, received, or stored.

The University will not monitor email as a routine matter. However, the University may monitor email to the extent permitted by law and as it deems necessary for purposes of maintaining the integrity and effective operation of the University’s Email System.

B.   Permissible Uses of Email Systems

Authorized users are only University faculty, staff, students, and other persons who have received accounts through Information Management. Account names will have the format of firstname.mi.lastname@jsums.edu or firstname.lastname@jsu.edu if no middle initial.
The use of any University resources for email must be related to University business and/or academic pursuits.  Incidental and occasional personal use of email may occur when such use does not generate a direct cost for the University.  The use of University Email Systems resources is subject to the provisions of this policy.

C.    Prohibited Uses of email

Prohibited Purposes

  1. Personal use that creates a direct cost for the University is prohibited.
  2. The University’s email system resources shall not be used for personal monetary gain or for commercial purposes that are not directly related to the University.
  3. Sending copies of documents in violation of copyright laws.
  4. Inclusion of the work of others in email communications in violation of copyright laws.
  5. Capture and “opening” of email except as required in order for authorized employees to diagnose and correct delivery problems.
  6. Use of email to harass or intimidate others or to interfere with the ability of others to conduct University business.
  7. Use of email or email systems for any purpose restricted or prohibited by laws or regulations.
  8. “Spoofing,” i.e. constructing an email communication so it appears to be from someone else.
  9. Attempting unauthorized access to email, attempting to breach any security measures on any email system, or attempting to intercept an email transmissions without proper authorization.