Guidelines - Computer Use/Electronic Information

From University of Nebraska Medical Center
Jump to: navigation, search

Guidelines List | Forms | Procedures


University of Nebraska Medical Center (UNMC) has a robust information technology environment. It is the responsibility of the workforce to utilize information technology resources in an appropriate manner. Individuals with access to information systems are expected to safeguard resources and maintain appropriate levels of confidentiality.


Computer Use/Electronic Information Policy #6051

E-mail

Access to e-mail is a privilege, not a right. Privacy of e-mail cannot be guaranteed. As e-mail is intended primarily for business purposes, with limited personal use allowed, it is owned by UNMC and is intended for use in completing UNMC’s mission. E-mail use is governed by Executive Memorandum No. 16, all applicable UNMC policies, including sexual harassment, patent and copyright, patient and student confidentiality, and student and employee disciplinary policies, as well as by applicable federal, state and local laws. Users should be aware that if an act of misuse has occurred, or if there is reasonable belief that potential damage to systems is genuine and serious, the chief information office may access any account file or other data controlled by the alleged violator and share such information with persons authorized to investigate such incidents.

Information Security and Internet Use

Information technology resources are owned by UNMC and are intended for use in completing UNMC’s mission. Their use is governed by Executive Memorandum No. 16, all applicable UNMC policies, including sexual harassment, patent and copyright, patient and student confidentiality, and student and employee disciplinary policies, as well as by applicable federal, state and local laws. Users should be aware that if an act of misuse has occurred, or if there is reasonable belief that potential damage to information systems is genuine and serious, the chief information office may access any account file or other data controlled by the alleged violator and share such information with persons authorized to investigate such incidents.