Student Electronic Communications Policy

Introduction. ECPI University (the “University”) is a user of many communications and information technologies. These technologies, when properly used, support educational activities and enable closer and timelier communications within the University and with employers. There is a continuing evolution of associated laws and conventions governing acceptable use of electronic communication tools and careless use can have dramatic consequences, harming the University, our students, employers, and employees. The policies outlined below are intended to minimize the likelihood of such harm by educating our students.

These policies address the appropriate use of electronic communications tools at the University. These tools include the following:

  • University-supplied software
  • Email accounts
  • University-supplied fax machines, modems, and servers
  • University-supplied computers
  • University-supplied network tools (such as browsers and Internet access facilities)

Use and Misuse of Communications Tools

Access. Access to University communications tools is provided in conjunction with the University’s academics and the student’s responsibilities. Use of these tools is subject to this policy and to other University policies and procedures. University communication tools may be made available to individuals who are not University students (e.g., visitors). Use of these tools by such persons is subject to this policy and to applicable agreement(s). Communication tools and all messages produced, stored, or carried by such tools are University properties, and are subject to reasonable University inspection.

Acceptable Use. In the course of the student’s academic study, each student may use communications tools to communicate internally with University faculty, staff, or students or externally with students, employers, and other business acquaintances. The University provides these electronic communications tools to facilitate educational communications and to enhance the learning experience. While these resources are primarily used in academics, there may be occasion to use these facilities for personal purposes. Personal use is permitted so long as it does not interfere with the academic process, consume significant resources, interfere with the activities of other students or faculty, or violate these policies. Under no circumstances shall such facilities be used for personal financial gain, or to solicit others for activities unrelated to the University’s academics, or in connection with political campaigns or lobbying. The Campus President may make available or otherwise authorize special-purpose bulletin boards and web pages in connection with University-approved social events, sporting events, and other sanctioned activities. When making use of these University-provided facilities for personal use, always remember that there is a very limited expectation of privacy (see discussion in 3 below).

In addition to other restrictions and conditions discussed here, ECPI communications tools may not be used for any of the following:

  • To carry any defamatory, discriminatory, or obscene material;
  • In connection with any infringement of another person’s intellectual property rights (e.g., copyrights and trademarks);
  • In a manner that violates the terms of any applicable telecommunications license or any laws governing trans-border data flow (e.g., laws dealing with data collection, protection, privacy, confidentiality, and security);
  • In connection with any attempt to penetrate computer or network security of any University, company, or other system, or to gain unauthorized access (or attempted access) to any other person’s computer, email or voicemail accounts or equipment; or
  • In connection with the violation or attempted violation of any other law.

The University understands that web “surfing” may be academic-related and serve a legitimate academic function, but the potential for abuse exists. The Internet provides access to a huge amount of information and resources that can greatly enhance our ability to deliver services efficiently to our students. Today there is no single, comprehensive directory of resources available for the Internet and users sometimes must “navigate” through much unneeded information to reach useful material.

The University encourages exploration of the Internet for legitimate academic-related or professional activities, but students may not “browse the web” during class (unless authorized), create personal “Home Pages,” or otherwise use University facilities to access Internet sites for reasons unrelated to the University’s academic requirements.

Representing the University in Personal Postings. The information you publish electronically (sometimes called a “Posting”) reflects on the University in general. Despite all disclaimers that a student may make (e.g., that the views are personal and do not reflect those of the University) readers elsewhere will make the association between these personal postings and the University. The student should know that true anonymity is very difficult to obtain when using these tools. While Internet relay chat (“IRC”), newsgroup visits, and net surfing sometimes appears to be done anonymously (e.g., by employing pseudonyms), accessing such services/servers through the University’s network facilities normally leaves an audit trail indicating at least the identity of the University proxy server (and may leave a trail pointing directly to the student). Inappropriate use of University facilities may damage the University’s reputation and could give rise to University and individual student liabilities. Accordingly, each student should make every effort to be professional in all usage of University communications tools.

Because readers may interpret personal postings to newsgroups as an official statement of the University, posting any article in a newsgroup related to the University’s academics is strictly prohibited unless approved in advance by the Campus President.

Unacceptable Content. Although the University does not regularly monitor email or electronic messages, please be aware that even personal email messages may be viewed publicly or by University administration without further notice. Under no circumstances may any posting, voice mail or email originating at the University be in violation of the letter or the spirit of the University’s Equal Employment Opportunity or Student Non-Harassment policies.

Examples of unacceptable content include:

  • Sexually explicit messages, images, cartoons, or jokes;
  • Propositions, requests for dates, or love letters;
  • Profanity, obscenity, slander, or libel;
  • Ethnic, religious, or racial slurs;
  • Political beliefs or commentary; or
  • Any other message that could be construed as harassment or disparagement of others based on their sex, race, sexual orientation, age, national origin, disability, or religious or political beliefs.

Everyone should be aware that sexual harassment includes unwelcome sexual advances, unwelcome requests for sexual favors, or other unwelcome conduct (including comments) of a sexual nature. The standard for sexual harassment is whether the recipient could reasonably consider the message to be offensive—the sender’s intentions are irrelevant.

In addition to prohibitions on sending or uploading offensive materials, University communications tools (email, browsers, newsreaders, etc.) also shall not be used to access or download obscene materials or other content that may be illegal under local law.

Electronic Forgery. Electronic forgery is defined as misrepresenting the student’s identity in any way while using electronic communications systems (e.g., by using another’s email account without permission, by so-called IP spoofing, or by modifying another’s messages without permission). For example, messages written by others should be forwarded as-is and with no changes, except to the extent that the student clearly indicate where you have edited the original message (for example, by using brackets [ ] or by using other characters * * * to flag edited text).

Electronic forgery is not allowed for any purpose. For email messages, the student may not take any action to misrepresent the identity of the person responsible for the message. A student may send email messages using another person’s account, but only with prior express approval from the account owner, and only when the text of the message indicates that the author is different than the email account holder.

For newsgroup postings, you may not misrepresent the identity of the sender, but you may (as may sometimes be appropriate) make postings on an anonymous basis. Keep in mind that true anonymity may be quite hard to obtain, and that most such attempts at least leave an audit trail that identifies the University as the source of the posting.

Intellectual Property. The Internet offers a universe of information, useful in conducting and furthering business operations. The student must always respect copyrights and trademarks of third parties and their ownership claims in images, text, video, and audio material, software, information and inventions. Do not copy, use, or transfer others’ materials without appropriate authorization. Be aware that downloaded software and other copyrighted material may be subject to licensing obligations or restrictions. In cases where it is possible that the software might be used by University administration or faculty in curriculum or service development or might be incorporated into final curriculum or services, it is critical that these licensing obligations be understood and strictly observed. Even when software is labeled freeware or shareware, there may be licensing restrictions that prohibit or limit the usage or commercialization of such items. Any questions may be directed to the Campus President.

Transmitting Confidential Information. Confidential information (whether owned by the University, its students, its vendors, or other persons) is not to be disclosed to unauthorized persons without prior authorization. The question of authorization will be a function of the type and ownership of the confidential information (e.g., different authority may be required for disclosure of University-owned information than for student-owned information). Also, authorization for disclosure may be limited to certain specific individuals within the University (e.g., on a need-to-know basis).

In some cases, posting or emailing confidential information that relates to new curriculum, teaching methods, research, or University services can constitute a “publication” and prevent the University from applying for approvals or later treating the information as “proprietary.” These consequences can follow even from postings or distributions that are not to the general public.

Generally, absent encryption or other security measures, confidential information should not be contained in email sent to outsiders or posted to newsgroups, and should not be placed on University communications tools that are available to third-parties.

Encryption. Only authorized encryption tools (software and hardware) may be used in connection with any University communications tools. Except with the prior written consent of the appropriate IT manager, all such tools must implement key-recovery or key-escrow techniques to permit the University to access and recover all encrypted information.

Remember that possession and use of encryption tools may be subject to complex laws or outright prohibitions in certain localities. Also, the export and import of computers carrying such tools may be subject to local regulation.

Limits of Privacy

Retention and Security of Messages. Email and voicemail messages, and computer-stored items all are University property and business records, and may have legal and operational effects identical to that of traditional, hard-copy documents. Accordingly, all email messages should be treated as though they may later be viewed by others. While confidential information may be contained in such messages, they should be created with the same care would be used in creating hardcopy documents.

Remember that no electronic communications facility is completely secure. This means that information stored on or carried over University communications tools may be the subject of accidental or intentional interception, mis-delivery, attack, or authorized University review.

When stored on computers, email messages and other files typically are subject to routine backup procedures. This means that copies of these files may be retained for long periods, in accordance with backup recycling and document retention procedures. Also, many site-wide backup systems do not guarantee privacy of backup copies (e.g., system administrators may have access).

A Limited Expectation of Privacy. The University respects the personal privacy of its students. However, because communications tools are provided for the University’s academic purposes, student rights of privacy in this context are quite limited. Students and others should have no expectation that any information transmitted over University facilities or stored on University-owned computers is or will remain private. These systems are owned and/or controlled by the University and are accessible at all times by the University for maintenance, upgrades, or any other business or legal purposes. Students who use University communications tools should be aware that our firewall (and other security tools) creates an audit log detailing every request for access in either direction by each user. Also, in the course of their duties, system operators and managers may monitor student use of the Internet or review the contents of stored or transmitted data.

The University permits personal use of all these communication tools on the express understanding that it reserves the right (for its business purposes or as may be required by law) to review student use of, and to inspect all material created by or stored on, these communications tools. Use of these tools constitutes each student’s permission for the University to monitor communications and to access files that are made on or with these communications tools.

University Access to Computers, Voicemail, and Email Systems. University administration may routinely examine students’ communications or files. Such examination generally may be expected to occur in the following circumstances, which are not intended to be all-inclusive:

  • Ensuring that University systems are not being used to transmit discriminatory or offensive messages, or in connection with the infringement or violation of any other person’s rights;
  • Determining the presence of illegal material or unlicensed software;
  • Counteracting theft or espionage;
  • Ensuring that communications tools are not being used for inappropriate purposes;
  • Responding to legal proceedings that call for producing electronically stored evidence;
  • Locating, accessing, and retrieving information in a student’s absence; and
  • Investigating indications of impropriety.

Consequences of Violating Policies. Misuse of any University communications tool or violation of these policies may result in disciplinary action up to and including suspension and dismissal from the University.

Questions/Changes to Policies. Questions regarding these policies may be directed to the Vice President for Academic Affairs or the University President. The University intends generally to observe these policies but also reserves the right to change them at any time without prior notice. The University will make reasonable efforts to provide notice of such changes.