Skip to content

Information Security Standards

Electronic Communication and Email Usage

  1. General
    University information resources are strategic assets and as such must be managed as valuable state resources. Since a large portion of University business is conducted using email, it is important that email services function in an efficient and reliable manner. These procedures, therefore, address expected standards for University email usage.
  2. Applicability
    This procedure describes acceptable practices regarding the use of email through University owned information resources. The purpose of this procedure is to provide a set of measures that will mitigate information security risks associated with email Use. The intended audience of this procedure is any University employee, student, guest, or visitor that may use any University information resource that has the capacity to send, receive or store email.
  3. Definitions
    Information Resources (IR): the procedures, equipment, and software that are designed, employed, operated, and maintained to collect, record, process, store, retrieve, display, and transmit information or data.
  4. Procedures
    The procedures determining acceptable use of University information resources are addressed in the following rules and procedure:

    System Policy 07.01, Ethics Policy
    University Rule 25.99.08.R1 Use of Telecommunications Service

Quick Links

Need an update?

To request a change to this page or to request access to make changes yourself, email