Computer Use/Electronic Information: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
(4 intermediate revisions by one other user not shown)
Line 23: Line 23:
</table>
</table>
<br />
<br />
[[Identification Card]] | [[Secure Area Card Access]] | [[Privacy/Confidentiality]] | [[Computer Use/Electronic Information]] | [[Retention and Destruction/Disposal of Private and Confidential Information]] | [[Use and Disclosure of Protected Health Information]] | [[Notice of Privacy Practices]] | [[Access to Designated Record Set]] | [[Accounting of PHI Disclosures]] | [[Patient/Consumer Complaints]] | [[Vendors]] | [[Fax Transmissions]] | [[Psychotherapy Notes]] | [[Facility Security]] | [[Conditions of Treatment Form]] | [[Informed Consent for UNMC Media]] | [[Transporting Protected Health Information]] | [[Honest Broker]] | [[Social Security Number]] | [[Third Party Registry]]
[[Identification Card]] | [[Secure Area Card Access]] | [[Privacy/Confidentiality]] | [[Computer Use/Electronic Information]] | [[Retention and Destruction/Disposal of Private and Confidential Information]] | [[Use and Disclosure of Protected Health Information]] | [[Notice of Privacy Practices]] | [[Access to Designated Record Set]] | [[Accounting of PHI Disclosures]] | [[Patient/Consumer Complaints]] | [[Vendors]] | [[Fax Transmissions]] | [[Psychotherapy Notes]] | [[Facility Security]] | [[Conditions of Treatment Form]] | [[Informed Consent for UNMC Media]] | [[Transporting Protected Health Information]] | [[Honest Broker]] | [[Social Security Number]] | [[Third Party Registry]] | [[Information Security Awareness and Training]]
<br /><br />
<br /><br />
Policy No.: '''6051'''<br />
Policy No.: '''6051'''<br />
Effective Date: '''04/25/07'''<br />
Effective Date: '''04/25/07'''<br />
Revised Date: '''08/20/13'''<br />
Revised Date: '''08/20/13'''<br />
Reviewed Date: '''01/23/13'''<br /><br />
Reviewed Date: '''09/19/17'''<br /><br />
<big>'''Computer Use and Electronic Information Security Policy'''</big>
<big>'''Computer Use and Electronic Information Security Policy'''</big>
== Introduction ==
== Introduction ==
Line 151: Line 151:
E-mail attachments and files transfer utilizing instant messaging capabilities represent a significant risk to the organization. Many computer viruses are distributed through e-mail attachments or files received via instant messaging. Users should be careful about opening e-mail attachments or accepting file transfers via instant messaging.  
E-mail attachments and files transfer utilizing instant messaging capabilities represent a significant risk to the organization. Many computer viruses are distributed through e-mail attachments or files received via instant messaging. Users should be careful about opening e-mail attachments or accepting file transfers via instant messaging.  
===Controlling the Distribution of Non-Solicited Marketing E-mail===
===Controlling the Distribution of Non-Solicited Marketing E-mail===
Electronic mail sent externally by UNMC personnel for the primary purpose of promoting UNMC’s “commercial” products or services must comply with the [http://www.unmc.edu/its/security/procedures/spam-compliants.html ITS Security Procedure: Controlling the Distribution of Non-Solicited Marketing Email]. Examples of such products or services include publications and membership solicitations. <br />
Electronic mail sent externally by UNMC personnel for the primary purpose of promoting UNMC’s “commercial” products or services must comply with the [https://info.unmc.edu/its-security/policies/procedures/spam-compliants.html ITS Security Procedure: Controlling the Distribution of Non-Solicited Marketing Email]. Examples of such products or services include publications and membership solicitations. <br />
<br />
<br />
The Act is applicable only to e-mail that constitutes a commercial advertisement or promotion of a commercial product or service. The Act is not applicable to commercial e-mail in general, to e-mail advertising or promoting “activity” or to e-mail simply because the e-mail references or solicits funds. Further, it is not applicable to e-mail messages sent to provide information about UNMC’s undergraduate, graduate, or professional degree-granting programs. Some programs not a part of the regular campus curriculum might be considered commercial “services” depending upon the facts. Advice from the Compliance Officer should be sought about such programs.
The Act is applicable only to e-mail that constitutes a commercial advertisement or promotion of a commercial product or service. The Act is not applicable to commercial e-mail in general, to e-mail advertising or promoting “activity” or to e-mail simply because the e-mail references or solicits funds. Further, it is not applicable to e-mail messages sent to provide information about UNMC’s undergraduate, graduate, or professional degree-granting programs. Some programs not a part of the regular campus curriculum might be considered commercial “services” depending upon the facts. Advice from the Compliance Officer should be sought about such programs.
Line 161: Line 161:
*Deliver goods or services, including upgrades or updates, which the recipient has previously requested or ordered from the sender.<br />
*Deliver goods or services, including upgrades or updates, which the recipient has previously requested or ordered from the sender.<br />
<br />
<br />
For more information, see [http://www.unmc.edu/its/security/procedures/spam-compliants.html ITS Security Procedure: Controlling the Distribution of Non-Solicited Marketing Email].
For more information, see [https://info.unmc.edu/its-security/policies/procedures/spam-compliants.html ITS Security Procedure: Controlling the Distribution of Non-Solicited Marketing Email].


===Campus-wide e-mail announcements===
===Campus-wide e-mail announcements===
Line 250: Line 250:
Reference: [http://www.ucop.edu/information-technology-services/ University of CA Guidelines], January 28, 2004
Reference: [http://www.ucop.edu/information-technology-services/ University of CA Guidelines], January 28, 2004
==Additional information==  
==Additional information==  
*[http://www.unmc.edu/its/security/index.html Information Technology Services]
*[https://info.unmc.edu/its-security/index.html Information Technology Services]
*Executive Memorandum No. 16, [http://nebraska.edu/docs/president/16%20Responsible%20Use%20of%20Computers%20and%20Info%20Systems.pdf Policy for Responsible Use of Information Resources]
*Executive Memorandum No. 16, [http://nebraska.edu/docs/president/16%20Responsible%20Use%20of%20Computers%20and%20Info%20Systems.pdf Policy for Responsible Use of Information Resources]
*Executive Memorandum No. 26, [http://nebraska.edu/docs/president/26%20Information%20Security%20Plan%20%28GLB%20Compliance%29.pdf University of Nebraska Information Security Plan]  
*Executive Memorandum No. 26, [http://nebraska.edu/docs/president/26%20Information%20Security%20Plan%20%28GLB%20Compliance%29.pdf University of Nebraska Information Security Plan]  
Line 260: Line 260:
*UNMC Policy No. 6057, [[Protected Health Information (PHI)|Use and Disclosure of Protected Health Information]]  
*UNMC Policy No. 6057, [[Protected Health Information (PHI)|Use and Disclosure of Protected Health Information]]  
*UNMC Policy No. 6065, [[Fax Transmissions|Facsimile Transmissions]]
*UNMC Policy No. 6065, [[Fax Transmissions|Facsimile Transmissions]]
*[http://www.unmc.edu/its/security/procedures/ UNMC Information Security Procedures]  
*[https://info.unmc.edu/its-security/policies/procedures/index.html UNMC Information Security Procedures]  
*[http://www.copyright.gov/legislation/dmca.pdf The Digital Millennium Copyright Act of 1998]  
*[http://www.copyright.gov/legislation/dmca.pdf The Digital Millennium Copyright Act of 1998]  
*[http://www.copyright.gov/ U.S. Copyright Office - General Guidelines About Copyright Law]  
*[http://www.copyright.gov/ U.S. Copyright Office - General Guidelines About Copyright Law]  


This page maintained by [mailto:dpanowic@unmc.edu dkp].
This page maintained by [mailto:dpanowic@unmc.edu dkp].

Navigation menu