What happens if a person is suspected of using their email account in violation of the law or to send questionable content?

Pursuant to the Computing Access Agreement, Information Technology does not monitor email content or email accounts. Minimal, short-lived logging is done on the system for performance and operational use showing messages queued for delivery or system load. Email account contents may be accessed for technical reasons (assisting users or system troubleshooting) without the knowledge of the owner.

Information Technology does not officially investigate or trace emails unless directed or requested to do so from College authority offices like Campus Police, Human Resources, or Student Life. In general all issues with objectionable email of a harassing or illegal nature must be routed through one of these authorities, typically Campus Police.

For further information on this subject, please click here.

Details

Article ID: 17379
Created
Wed 10/12/16 11:51 AM