Email Use & Retention

Overview

This policy provides the rules and requirements for the secure use and management of electronic mail (email). Email is a critical communication tool used by York College of Pennsylvania. Because of its power and ease of use, misuse of college information and resources through email poses a significant risk.

 

Purpose

This policy is designed to outline the various responsibilities that users have with regards to their use of email in order to protect the College, its faculty, staff and students from electronic and legal harm resulting from improper use of Library Technology Services.

 

Scope

All email users are expected to comply with this policy. This policy applies whether email is accessed from York College networks or via any remote location. This policy covers appropriate use of any email sent from a York College email address and applies to all employees, students, vendors, and agents operating on behalf of York College of Pennsylvania.

 

Policy

​​​​​​​​​​​​​​​​​​​

Monitoring

York College may monitor messages without prior notice and staff members have no reasonable expectation of privacy in email received or transmitted over York College’s computer systems. The College and its email system administrators will not read email unless necessary in the course of their duties, conducting an investigation for suspected inappropriate use, or if directed by legal counsel. The College will comply with the release of emails to law enforcement if presented with an executed subpoena or court order valid in the Commonwealth of Pennsylvania.

 

Enforcement

Users who violate this policy may be denied access to College computing resources and may be subject to other penalties and disciplinary action, including possible expulsion or dismissal. Alleged violations will be handled through the college disciplinary procedures applicable to the user. The College may suspend, block, or restrict access to an account, independent of such procedures, when it reasonably appears necessary to do so in order to protect the integrity, security, or functionality of the College or other computing resources or to protect the College from liability. The College may also refer suspected violations of applicable law to appropriate law enforcement agencies.

 

Revised 6/12/2019

Print Article

Details

Article ID: 18718
Created
Mon 3/11/24 1:21 PM