Ivy Tech Community College of Indiana will make reasonable efforts to maintain the integrity and effective operation of its electronic mail systems, but users are advised that those systems should in no way be regarded as a secure medium for the communication of sensitive or confidential information. Because of the nature and technology of electronic communication, the College can assure neither the privacy of an individual user's use of the College's e-mail resources nor the confidentiality of particular messages that may be created, transmitted, received, or stored thereby.
College staff and e-mail administrators may see the contents of e-mail due to serious addressing errors or as a result of maintaining the e-mail system. In those cases where College staff may see the contents of private e-mail, they are required to keep the contents confidential. Users should also be aware that the current design of the Internet is such that the privacy of e-mail that leaves Ivy Tech Community College of Indiana cannot be guaranteed.
E-mail accounts are backed up as a regular course of network operation. The deletion of an e-mail message does not remove all copies of the messages. Once sent, an e-mail message will not be deleted or altered by the College's system administrators, or any other College sponsored parties. The College is not liable for lost or deleted messages.
Only students and other persons who have received permission under the appropriate College authority are authorized users of the College's electronic mail systems and resources.
Prohibited Uses of E-mail
- Excessive personal use that creates a direct cost for the College is prohibited.
- The College's electronic mail resources shall not be used for personal monetary gain or for commercial purposes that are not directly related to College business.
- Sending copies of documents in violation of copyright laws
- Inclusion of the work of others into electronic mail communications in violation of copyright laws.
- Use of electronic mail to harass or intimidate others or to interfere with the ability of others to conduct College business.
- Use of electronic mail systems for any purpose restricted or prohibited by laws or regulations.
- Constructing an electronic mail communication so it appears to be from someone else.
- Obtaining access to the files or electronic mail of others for the purpose of prying or snooping is prohibited.
- Attempting unauthorized access to electronic mail or attempting to violate any security measures on any electronic mail system, or attempting to intercept any electronic mail transmissions.
- Use computer programs to decode passwords or access control information.
- Attempt to circumvent or subvert system security measures.
- Knowingly engage in any activity that causes harm to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, or damaging files.