Computer Use/Electronic Information: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
No edit summary
Line 42: Line 42:
#[http://www.unmc.edu/its/information_security_procedures.htm UNMC Information Security Procedures]  
#[http://www.unmc.edu/its/information_security_procedures.htm UNMC Information Security Procedures]  
#UNMC Policy 6045, [[Privacy/Confidentiality|Privacy, Confidentiality and Information Security]]   
#UNMC Policy 6045, [[Privacy/Confidentiality|Privacy, Confidentiality and Information Security]]   
#<big>'''''Information Technology Security Procedures'''''</big>delete??
#Executive Memorandum No. 16, [http://nebraska.edu/docs/president/16%20Responsible%20Use%20of%20Computers%20and%20Info%20Systems.pdf Policy for Responsible Use of Information Resources]
#Executive Memorandum No. 16, [http://nebraska.edu/docs/president/16%20Responsible%20Use%20of%20Computers%20and%20Info%20Systems.pdf Policy for Responsible Use of Information Resources]
#Executive Memorandum No. 26, [http://nebraska.edu/docs/president/26%20Information%20Security%20Plan%20%28GLB%20Compliance%29.pdf University of Nebraska Information Security Plan]  
#Executive Memorandum No. 26, [http://nebraska.edu/docs/president/26%20Information%20Security%20Plan%20%28GLB%20Compliance%29.pdf University of Nebraska Information Security Plan]  
Line 141: Line 140:
#Public Affairs Copyright and Disclaimer
#Public Affairs Copyright and Disclaimer
===Privacy===
===Privacy===
Users should be aware that privacy cannot be guaranteed. UNMC ITS staff do not regularly audit e-mail, voice mail or other information systems for content except under the direction of UNMC internal investigations. However, users should be aware that UNMC information technology technical personnel have authority to access individual user files, data and voice mail in the process of performing repair, maintenance of information systems or supporting UNMC internal or external investigations (See UNMC Policy No. 6055, [[Fraud]] and Executive Memorandum No. 16 [http://nebraska.edu/docs/president/16%20Responsible%20Use%20of%20Computers%20and%20Info%20Systems.pdf Policy for Responsible Use of Information Resources]). In the event violations to this policy are discovered as a result of the maintenance activity, ITS will bring the issue to the attention of the appropriate dean, director or department head and the Assistant Vice Chancellor for Human Resources.<br />
Users should be aware that privacy cannot be guaranteed. UNMC ITS staff do not regularly audit e-mail, voice mail or other information systems for content except under the direction of UNMC internal investigations. However, users should be aware that UNMC information technology technical personnel have authority to access individual user files, data and voice mail in the process of performing repair, maintenance of information systems or supporting UNMC internal or external investigations (See UNMC Policy No. 6055, [[Fraud]] and Executive Memorandum No. 16, [http://nebraska.edu/docs/president/16%20Responsible%20Use%20of%20Computers%20and%20Info%20Systems.pdf Policy for Responsible Use of Information Resources]). In the event violations to this policy are discovered as a result of the maintenance activity, ITS will bring the issue to the attention of the appropriate dean, director or department head and the Assistant Vice Chancellor for Human Resources.<br />
<br />
<br />
UNMC Information Technology Services will not release IDs/passwords for voice mail or information systems to anyone other than the user without explicit review by and permission from the Assistant Vice Chancellor for Human Resources or Vice President General Counsel.
UNMC Information Technology Services will not release IDs/passwords for voice mail or information systems to anyone other than the user without explicit review by and permission from the Assistant Vice Chancellor for Human Resources or Vice President General Counsel.
Line 149: Line 148:
E-mail attachments and files transfer utilizing instant messaging capabilities represent a significant risk to the organization.  Many computer viruses are distributed through e-mail attachments or files received via instant messaging. Users should be careful about opening e-mail attachments or accepting file transfers via instant messaging.  
E-mail attachments and files transfer utilizing instant messaging capabilities represent a significant risk to the organization.  Many computer viruses are distributed through e-mail attachments or files received via instant messaging. Users should be careful about opening e-mail attachments or accepting file transfers via instant messaging.  
===Controlling the Distribution of Non-Solicited Marketing E-mail===
===Controlling the Distribution of Non-Solicited Marketing E-mail===
Electronic mail sent externally by UNMC personnel for the primary purpose of promoting UNMC’s “commercial” products or services must comply with the '''ITS Security Procedure: Controlling the Distribution of Non-Solicited Marketing Email'''.  Examples of such products or services include publications and membership solicitations. <br />
Electronic mail sent externally by UNMC personnel for the primary purpose of promoting UNMC’s “commercial” products or services must comply with the [http://www.unmc.edu/its/docs/security_SpamCompliance.pdf ITS Security Procedure: Controlling the Distribution of Non-Solicited Marketing Email].  Examples of such products or services include publications and membership solicitations. <br />
<br />
<br />
The Act is applicable only to e-mail that constitutes a commercial advertisement or promotion of a commercial product or service.  The Act is not applicable to commercial e-mail in general, to e-mail advertising or promoting “activity” or to e-mail simply because the e-mail references or solicits funds. Further, it is not applicable to e-mail messages sent to provide information about UNMC’s undergraduate, graduate, or professional degree-granting programs. Some programs not a part of the regular campus curriculum might be considered commercial “services” depending upon the facts. Advice from the Compliance Officer should be sought about such programs.
The Act is applicable only to e-mail that constitutes a commercial advertisement or promotion of a commercial product or service.  The Act is not applicable to commercial e-mail in general, to e-mail advertising or promoting “activity” or to e-mail simply because the e-mail references or solicits funds. Further, it is not applicable to e-mail messages sent to provide information about UNMC’s undergraduate, graduate, or professional degree-granting programs. Some programs not a part of the regular campus curriculum might be considered commercial “services” depending upon the facts. Advice from the Compliance Officer should be sought about such programs.
Line 159: Line 158:
*Deliver goods or services, including upgrades or updates, which the recipient has previously requested or ordered from the sender.<br />
*Deliver goods or services, including upgrades or updates, which the recipient has previously requested or ordered from the sender.<br />
<br />
<br />
For more information, see Contro<big>lling the Distribution of Non-Solicited Marketing E-mail Procedures.</big>
For more information, see [http://www.unmc.edu/its/docs/security_SpamCompliance.pdf ITS Security Procedure: Controlling the Distribution of Non-Solicited Marketing Email].
===Campus-wide e-mail announcements===
===Campus-wide e-mail announcements===
Sending out mass distribution e-mails containing event and/or general announcement type information is discouraged.  If you have an event to publicize or an announcement to deliver to a large group of people, the best way to do this is through UNMC Today, the campus electronic newsletter. Contact Public Relations for additional information.<br />
Sending out mass distribution e-mails containing event and/or general announcement type information is discouraged.  If you have an event to publicize or an announcement to deliver to a large group of people, the best way to do this is through UNMC Today, the campus electronic newsletter. Contact Public Relations for additional information.<br />

Navigation menu