Electronic Mail Policy - NIU - Division of Information Technology

      

   

NIU Technology Policies & Standards

Northern Illinois University Electronic Mail (E-Mail) Policy

Northern Illinois University (NIU) participates in a range of computing networks. Many members of the university community, including faculty, staff, volunteers, and students, use electronic mail (e-mail) in their day-to-day activities. E-mail services are provided on university-owned computing and networking systems to further the university's mission of research, instruction, and public service. E-mail services are also considered a conditional employee benefit and may be utilized for personal messages subject to the limitations set forth in these and other applicable policies and to the extent that personal usage does not interfere with assigned responsibilities. Use of e-mail should be consistent with this mission and this policy.

The university utilizes GroupWise as its official email communication mechanism. Official university correspondence, including, but not limited to, messages from the President, policy information, employment, and benefit notifications, are electronically distributed through the GroupWise system. Employees whose departments utilize other email systems are responsible for checking their GroupWise accounts or forwarding such messages to their alternative email system for official university correspondence. Employees who choose to forward NIU email content to third-party email providers have the responsibility to ensure that appropriate security is maintained whenever such content is classified as "restricted” or "sensitive” information (see the NIU Information Security Policy for definitions and requirements).

Mass mailings are permitted, but need to follow these guidelines:

Mass Mailing Requirements (for more than 100 users):

  • Provost (or designee) approval for distribution to students (only required if students are outside of the sender's academic area of responsibility).
  • Vice President for Administration (or designee) approval for distribution to employees (only required if the distribution is to include employees outside of the sender's area of responsibility).
  • Whenever possible, include the content within the message itself as opposed to utilizing attachments.
  • Utilize a web-based link to the source for any high-resolution graphics, streaming content, or any material that would substantially increase the message size.
  • Distribution lists are not released by the approval areas.  Therefore, coordination is necessary between the approval area and the individual requesting the distribution.  The message will be sent out from the primary approval area when authorized. 
  • University Relations general distribution measures may be utilized after approval by the primary approval area when most appropriate.

Unacceptable uses include, but are not limited to, the following:

  • Using e-mail for any purpose that violates federal law, state law, or university policy.
  • Use of electronic mail inconsistent with university Acceptable Use policies.
  • Using e-mail for commercial purposes.
  • Misrepresenting your identity or affiliation in e-mail communications.
  • Sending patently harassing, intimidating, abusive, or offensive material to or about others.
  • Intercepting, disrupting, or altering electronic communications packets.
  • Using someone else's identity and password.
  • Use of the employment title or GroupWise signature in private communications.  The public may potentially be misled by any individual's unauthorized use of an NIU employment title representing their status or position in private communications.
  • Causing congestion on the network by propagating chain letters, broadcasting inappropriate messages to lists or individuals, or using an excessive amount of data storage in the e-mail post office.
  • Using GroupWise resources for political activities, including organizing or participating in any political meeting, rally, demonstration, soliciting contributions or votes, distributing material, surveying or polling for information connected to a political campaign, completing political surveys or polling information, and any other activities prohibited under the ethics act and/or other state/federal laws.
  • Assigning a priority of "high" to a mass mailing.

Communications in this medium are protected by the same laws and policies, and are subject to the same limitations, as communications in other media. However, users should exercise caution when committing confidential information to electronic media because the confidentiality of such material cannot be guaranteed. For example, e-mail messages can be saved indefinitely on the receiving computer. Copies can easily be made and forwarded to others either electronically or on paper. Messages sent to nonexistent or incorrect user names are delivered to a person designated as Postmaster for either the remote or local site. Routine maintenance or system administration of a computer may result in the contents of files and communications being seen (network and system administrators are, however, expected to treat the contents of electronic files as private and confidential).

Under the Illinois Freedom of Information Act (FOIA) and e-Discovery laws, electronic files are considered the same as paper files. Any official university documents (as defined by law) in the files of employees of the State of Illinois are considered public documents and may be subject to inspection through FOIA or e-Discovery unless exempted by law. In such cases, the campus Freedom of Information Officer, or other applicable official, should inspect files to determine which portions may be exempt from disclosure. Any inspection of electronic files and any action based upon such inspection will be governed by all applicable U.S. and Illinois laws and by university policies.

Acceptable use of NIU information technology resources is based on common sense, decency, ethical use, civility, and security applied to the computing environment. All authorized users may expect reasonable privacy with regard to all computer files and e-mail. The University may access university-owned or networked computers for maintenance and upgrades and to monitor or troubleshoot networks for related security, network audits, investigations, and/or legal requirements. Computers or systems may also be accessed through established procedures for reasonably suspected abuse of this policy and/or other University acceptable use policies. If illicit activity of any kind is suspected as a result of routine monitoring, an internal or external investigation may result. The university reserves the right to access university property with or without notice. Thus, users may or may not receive notification of such access. Certain violations of this electronic mail policy, which involve the potential for illegal conduct (including accessing certain pornographic sites or any activity which may constitute fraud or the misappropriation of university resources) may be reported to external agencies or law enforcement for investigation.

Access to the information technology environment in general, and electronic mail in particular, at Northern Illinois University is a privilege and must be treated as such by all users of these systems. Like any other campus facility, abuse of these privileges can be a matter of legal action or official campus disciplinary procedures. Depending on the seriousness of an offense, violation of the policy can result in penalties ranging from written warning (i.e., don't do this anymore), to loss of access, to referral to university authorities for disciplinary action. In a case where unacceptable use severely impacts performance or security, in order to sustain reasonable performance and secure services for the rest of the user community, Information Technology Services (ITS) will immediately suspend an individual's access privileges.

Policy modified: 09/14/2012