{"id":555,"date":"2014-07-16T00:26:25","date_gmt":"2014-07-16T00:26:25","guid":{"rendered":"https:\/\/www.jsums.edu\/staffhandbook\/?page_id=555"},"modified":"2016-07-05T21:34:44","modified_gmt":"2016-07-05T21:34:44","slug":"5-5-2-email-systems","status":"publish","type":"page","link":"https:\/\/www.jsums.edu\/staffhandbook\/5-5-2-email-systems\/","title":{"rendered":"5.5.2  \tEmail Systems"},"content":{"rendered":"<p>\n\t<strong>&nbsp; &nbsp; &nbsp;A. &nbsp;Privacy and Confidentiality<\/strong>\n<\/p>\n<div>\n\tJackson State University provides Email System resources to support the work of its mission.&nbsp; Jackson State University will make reasonable efforts to maintain the integrity and effective operation of its email systems. Because of the nature and technology of electronic communication, the University cannot ensure the privacy of an individual&rsquo;s use of the University&rsquo;s Email System resources or the confidentiality of particular messages that may be created, transmitted, received, or stored.\n<\/div>\n<p>\n\t<span style=\"line-height: 1.6em\">The University will not monitor email as a routine matter. However, the University may monitor email to the extent permitted by law and as it deems necessary for purposes of maintaining the integrity and effective operation of the University&rsquo;s Email System.<\/span>\n<\/p>\n<p style=\"margin-left:.25in\">\n\t<strong>B. &nbsp;&nbsp;<\/strong><strong>Permissible Uses of Email Systems<\/strong>\n<\/p>\n<div style=\"text-align: justify\">\n\t<span style=\"line-height: 1.6em\">Authorized users are only University faculty, staff, students, and other persons who have received accounts through Information Management. Account names will have the format of <\/span><a href=\"mailto:firstname.mi.lastname@jsums.edu\" style=\"line-height: 1.6em\">firstname.mi.lastname@jsums.edu<\/a><span style=\"line-height: 1.6em\"> or <\/span><a href=\"mailto:firstname.lastname@jsu.edu\" style=\"line-height: 1.6em\">firstname.lastname@jsu.edu<\/a><span style=\"line-height: 1.6em\"> if no middle initial.<\/span>\n<\/div>\n<div style=\"text-align: justify\">\n\t&nbsp;\n<\/div>\n<div style=\"text-align: justify\">\n\tThe use of any University resources for email must be related to University business and\/or academic pursuits.&nbsp; Incidental and occasional personal use of email may occur when such use does not generate a direct cost for the University.&nbsp; The use of University Email Systems resources is subject to the provisions of this policy.\n<\/div>\n<p style=\"margin-left:13.5pt\">\n\t<strong>C.&nbsp;&nbsp; <\/strong><strong>&nbsp;Prohibited Uses of email<\/strong>\n<\/p>\n<p>\n\t<strong style=\"line-height: 1.6em\">Prohibited Purposes<\/strong>\n<\/p>\n<ol start=\"1\">\n<li>\n\t\t<span style=\"line-height: 1.6em\">Personal use that creates a direct cost for the University is prohibited.<\/span>\n\t<\/li>\n<li>\n\t\t<span style=\"line-height: 1.6em\">The University&rsquo;s email system resources shall not be used for personal monetary gain or for commercial purposes that are not directly related to the University.<\/span>\n\t<\/li>\n<li>\n\t\t<span style=\"line-height: 1.6em\">Sending copies of documents in violation of copyright laws.<\/span>\n\t<\/li>\n<li>\n\t\t<span style=\"line-height: 1.6em\">Inclusion of the work of others in email communications in violation of copyright laws.<\/span>\n\t<\/li>\n<li>\n\t\t<span style=\"line-height: 1.6em\">Capture and &ldquo;opening&rdquo; of email except as required in order for authorized employees to diagnose and correct delivery problems.<\/span>\n\t<\/li>\n<li>\n\t\t<span style=\"line-height: 1.6em\">Use of email to harass or intimidate others or to interfere with the ability of others to conduct University business.<\/span>\n\t<\/li>\n<li>\n\t\t<span style=\"line-height: 1.6em\">Use of email or email systems for any purpose restricted or prohibited by laws or regulations.<\/span>\n\t<\/li>\n<li>\n\t\t<span style=\"line-height: 1.6em\">&ldquo;Spoofing,&rdquo; i.e. constructing an email communication so it appears to be from someone else.<\/span>\n\t<\/li>\n<li>\n\t\t<span style=\"line-height: 1.6em\">Attempting unauthorized access to email, attempting to breach any security measures on any&nbsp;email system, or attempting to intercept an email transmissions without proper authorization.<\/span>\n\t<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; &nbsp;A. &nbsp;Privacy and Confidentiality Jackson State University provides Email System resources to support the work of its mission.&nbsp; Jackson State University will make reasonable efforts to maintain the integrity and effective operation of its email systems. Because of the nature and technology of electronic communication, the University cannot ensure the privacy of an [&hellip;]<\/p>\n","protected":false},"author":78,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.jsums.edu\/staffhandbook\/wp-json\/wp\/v2\/pages\/555"}],"collection":[{"href":"https:\/\/www.jsums.edu\/staffhandbook\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jsums.edu\/staffhandbook\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/staffhandbook\/wp-json\/wp\/v2\/users\/78"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/staffhandbook\/wp-json\/wp\/v2\/comments?post=555"}],"version-history":[{"count":2,"href":"https:\/\/www.jsums.edu\/staffhandbook\/wp-json\/wp\/v2\/pages\/555\/revisions"}],"predecessor-version":[{"id":1016,"href":"https:\/\/www.jsums.edu\/staffhandbook\/wp-json\/wp\/v2\/pages\/555\/revisions\/1016"}],"wp:attachment":[{"href":"https:\/\/www.jsums.edu\/staffhandbook\/wp-json\/wp\/v2\/media?parent=555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}