Information Technology

Email Policy Highlights

A Quick Guide to the Pacific Union College
Electronic Mail Policy

This is a summary. Please refer to the full text of the Pacific Union College Computer Use
for further detail.

Email may be subject to disclosure under the California Public Records
Act. The College may access or disclose your email under specified
circumstances described in the Computer Use Policy.

  • Information Technology Systems and Services (ITSS) staff may
    inadvertently see the contents of email messages in the course of their duties.
  • Your email facility may have copies of email on a back-up system even
    after you have discarded the messages
  • Back-up copies may be retained for periods of time and in locations
    unknown to senders and recipients
  • The security and confidentiality of email cannot be guaranteed. Password
    protection is not foolproof.
  • It is possible for senders of email to mask their identity.
  • Recipients are able to forward your email without your knowledge or
  • The contents of forwarded messages can be changed from the original.
  • Policy violations may result in restriction of access to College information
    technology resources and other serious consequences.
  • Federal and California Penal Codes make certain computer crimes felony
  • Your College email address is owned by Pacific Union College and is
    permanently assigned for your use.

You are encouraged to:

  • Think twice before you click the "send" button.
  • Comply with College policies and state and federal laws that apply to
  • Protect the confidentiality of information you encounter inadvertently in
    email or other records.
  • Follow campus procedures for authorization and notification if you must
    access another person's email.
  • Respect the privacy of other people's email.
  • Use personal and professional courtesy and considerations in email.
  • Employ protection such as passwords to deter potential intruders.
  • Check with the sender if there is any doubt about the authenticity of a
  • Request information on the back-up practices of the email facilities you
  • Ask for advice if you are not sure what the Policy allows.

You should not:

  • Violate law and PUC policy by theft or abuse of PUC facilities and resources.
  • Seek out, use, or disclose personal or confidential information unless
  • Access or disclose other people's email without prior consent.
  • Knowingly interfere with other people's use of email.
  • Send "spam" or chain letters.
  • Knowingly disrupt College electronic mail and other services.

Results of Misuse

Minor infractions of the policy, when accidental, or unintended, will generally be resolved informally by the Information Technology Systems and Services management. Repeated minor infractions or serious misconduct may result in the loss of system access. Additionally, any misuse may be prosecuted under applicable laws. Users may also be held accountable under applicable College policies. Any offense which violates local, state, or federal laws may result in the immediate loss of college computing resource privileges and will be referred to appropriate College offices or law enforcement authorities.

By my use of any PUC computing facilities, I agree to abide by the stated guidelines and policies.