Security and Privacy of E-Mail

Kent State University employs various measures to protect the security of its computing resources and its users’ accounts. Users should be aware, however, that the university cannot guarantee the absolute security and privacy of data stored on university computing facilities. Users should therefore engage in "safe computing" practices by establishing appropriate access restrictions for their accounts, guarding their passwords, changing them regularly and backing up critical files when appropriate. Do not keep confidential mail files on your account; delete them or download them to a PC and encrypt them.

Users also should be aware that the use of university computing resources is not completely private. While the university does not routinely monitor individual usage of its computing resources, the normal operation and maintenance of the university’s computing resources require the backup and caching of data and communications, the logging of activity, the monitoring of general usage patterns and other such activities that are necessary for the normal operation of service. The university may also specifically monitor the activity and accounts of individual users of university computing resources, including individual log-in sessions and communications without notice when (a) the user has voluntarily made them accessible to the public, as by posting to a Web page; (b) it reasonably appears necessary to do so to protect the university from liability; (c) there is reasonable cause to believe that the user has violated, or is violating, university policy; (d) an account appears to be engaged in unusual or unusually excessive activity, as indicated by the monitoring of general activity and usage patterns; or (e) it is otherwise required or permitted by law. Any such individual monitoring, other than that specified under "(a)," required by law, or necessary to respond to perceived emergency situations, must be authorized in advance by the vice president for information services/chief information officer or his/her designees. Communications made by means of university computing resources are generally subject to Ohio’s Public Records Statute to the same extent as they would be if made on paper. Your connection to the university’s wireless network may be unsecured, and data such as passwords, e-mail and instant messages could be intercepted by other users. The use of secure websites (HTTPS), VPN or wireless encryption is strongly recommended if any sensitive data is involved.
 
 

This page was last modified on August 20, 2009