UCR

UCR Policies and Procedures

Printer Friendly Version

Untitled Document

Electronic Communications Policy (ECP) Overview and Implementation at UCR

 

Campus Policy: 400-31

Policy Owner: University of California, Riverside

Effective date: 01/27/05

Electronic Communications Policy (ECP)

    Please visit http://www.ucop.edu/ucophome/policies/ec/ for the complete text of the policy.  Please note that neither the overview nor the implementation guidelines contained in this document are designed to replace or supersede any ECP provisions or mandates.  Queries relating to the ECP, UCR's ECP implementation, or any background materials should be addressed to the Associate Vice Chancellor, Computing and Communications or the Director of Computing Support Services, Computing and Communications.

  1. Overview
  2. UCR encourages the use of electronic communications resources and makes them widely available to the university community.  Nevertheless, as with all university assets, any single individual's use of campus electronic resources is limited by the constraints required for reliable operations of the systems and services that provide electronic communications.

    Importantly, UCR in general cannot (and does not wish to be) the arbiter of the contents of electronic communications.   Moreover, the University cannot always protect users from receiving electronic communications they might find undesirable or offensive.  (Page 5 ECP.)

  3. Objective
    1. Commitment to Confidentiality.
    2. UCR recognizes that core University principles relating to academic freedom and shared governance, freedom of speech, and respect for privacy and confidentiality hold important implications for the management and use of campus electronic communications resources.  (Page 10 ECP.)

      With these core principles in mind, UCR does not routinely inspect, monitor, or disclose electronic communications without the holder's consent.  (Page 10 ECP.)

      Under very limited circumstances, and subject to the requirements for authorization, notification, and other conditions specified under UC policy, UCR may deny access to its electronic communications services and may inspect, monitor, and/or disclose electronic communications.  (Page 10 ECP.)

      UCR (under UC Policy) prohibits employees and others from "seeking out, using, or disclosing" personal information without authorization and requires employees to take necessary precautions to protect the confidentiality of personal information encountered in the performance of their duties. (Page 10 ECP.)

  4. Background
    1. Allowable Uses.
    2. As a general guideline, allowable use of electronic communications falls into one of the following broad categories: one, creating web sites and electronic mailing lists; two, sending and receiving e-mail and accessing the Internet; three, making telephone calls; and four, use of electronic resources for the purposes of teaching, conducting research, public service, and/or conducting university business.

      As a general rule, electronic communications may not be used for the following: one, any illegal activities, including cyberstalking, digital copyright infringement, disrupting Internet and UCR intranet networks and systems (for example by transmitting viruses, sending spam, or hacking into others' transmissions or files), and tapping telephones; two, any activities that violate University policies, including policies on sexual and other harassment; three, any activities that utilize the University's name and/or seal without appropriate approvals; and four, any activities that utilize UCR electronic communications resources for commercial benefit.

    3. Allowable Users
      1. UCR Users.  UCR users include UCR students, faculty, staff, and others affiliated with the campus (including those in program, contract, or license relationships with the University).  UCR users, in general, are eligible to use UCR electronic communications resources and services for purposes supporting the university's three-fold mission of teaching, research, and public service.
      2. Public Users.  Public users and organizations may only access campus electronic communications resources or services under programs sponsored by the UCR or any of its sub-units, as authorized by the Chancellor (e.g. public patrons of the campus library may access the campus wireless network).
    4. Access Restrictions:
    5. Access to (and use of) campus electronic communications resources and services is a privilege provided at the discretion of the university.

      Access may be restricted under the following circumstances (Page 9 ECP):

      1. When there is substantial reason to believe that violations of law (e.g. a DMCA violation) or UCR (or University) policies have taken place.
      2. When there are compelling circumstances (as defined in U.C. policy).
      3. When time-dependent, critical operational circumstances exist (as defined in U.C. policy, e.g. denial of services network attack).

    6. Access without Consent.
    7. UCR only permits the inspection, monitoring, or disclosure of electronic communications records without the consent of the holder of such records when one or more of the following apply AND when appropriate campus approvals have been obtained (Page 10 ECP):

      1. When required by and consistent with law.
      2. When there is substantiated reason to believe that violations of law or of University policies have taken place.
      3. When there are compelling circumstances (as defined in U.C. policy).
      4. When time-dependent, critical operational circumstances exist (as defined in U.C. policy).
    8. Privacy Protection.
    9. UCR observes all appropriate legal and policy requirements relating to privacy protection (including, but not limited to, FERPA requirements, SB1386 requirements, IS-3 requirements, privacy laws relating to telephone use, etc.).

      UCR will provide information about back-up procedures to users of those services upon request.

    10. Security.
    11. UCR attempts to provide secure and reliable electronic communications services. All providers of UCR electronic communications resources (e.g. central, departmental, and unit providers) are required to follow sound professional practices in providing for the security of electronic communications records, data, application programs, and systems based on UCR guidelines and IS-3 policy.

      The foundations of secure and reliable electronic communications services are systems that incorporate appropriate authentication, authorization, backup and recovery, physical security, logical security, software control, and managerial control mechanisms (again, per campus guidelines and IS3 policy). (Page 15 ECP).

    12. Backups.
    13. UCR does not maintain central or distributed electronic archives of all electronic communications sent or received.  Electronic communications are routinely backed-up; however, this is only to assure system integrity and reliability.  Electronic communications backups are not designed to provide for future information retrieval, although back-ups may at times serve the latter purpose incidentally.  Providers of University electronic communications services are not required by this university policy to routinely retrieve electronic communications from such back-up facilities for individuals.

  5. Detailed Procedures: Electronic Communications Policy (ECP) Implementation at UCR
    1. Electronic Communication Services.  UCR encourages the use of electronic communications in support of the University's three-fold mission of research, teaching, and public service.  UCR allocates its electronic resources with the objective of providing the greatest possible benefit to the entire campus community.

    1. Understanding Identity Management at UCR and Access to Electronic Communications Services.
    2. In general, authenticated access to UCR's electronic communications resources is provided via UCR's Identity Management systems and processes.  These systems and processes are managed by UCR's central information technology organization, Computing and Communications (C&C).  A primary objective of C&C's Identity Management systems and processes is to provide access to electronic communications in a quick, efficient, and secure fashion.

      Via UCR's Identity Management processes, campus students, staff, and faculty are provided a common identifier known as a UCR NetID that is used to authenticate individuals to various UCR systems providing electronic communications services.

      Highlights of UCR's Identify Management systems and processes include the following:

      1. SIS* (Student Information System - used for students) and PPS (Payroll Personnel System - used for faculty and staff) provide input to the campus Enterprise Directory (UCR utilizes an industry standard directory services and protocols).
      2. Prior to PPS entries populating the Enterprise Directory, departmental administrative staff provides additional information (e.g. working title, secondary titles, etc.) to ensure information contained in the campus Enterprise Directory is as meaningful and robust as possible.
      3. Once UCR staff, faculty, and student information makes its way to the Enterprise Directory, individuals are automatically granted access to several electronic communications services (e.g. e-mail, etc.) and are eligible for access to other systems (e.g. electronic travel system).
      4. When students are no longer enrolled at UCR, or when employees are terminated and removed from PPS, they are AUTOMATIALLY removed from UCR's Enterprise Directory and access to authenticated electronic communications resources ends.

    3. General Notes Relating to Various Electronic Communications Services
      1. Email.  UCR email addresses (@ucr.edu) provided to employees, students, and affiliates are considered public records under the California Public Records Act and may be published unless access is restricted under applicable law (e.g. Federal Family Educational Rights and Privacy Act of 1974).
      2. Generic business email addresses (not based on an individual's name) should be used for activities that generate a high volume of departmental or unit e-mail.  Such usage that prevents business disruption should reflect departmental personnel change. Examples: cnas@ucr.edu, biochem@ucr.edu, finaid@ucr.edu, parking@ucr.edu, etc.  These business designations must be approved by a responsible departmental or unit official and submitted to Computing and Communications for authorization.

      3. Web and Other Services.  UCR provides access to web resources in the support of University business.
      4. UCR does not routinely collect information about an individual's web use or sites visited.  Except when tracking a reported crime, the monitoring of web sites visited, or web use in general, is not permitted under U.C. policy.

        If a campus system automatically collects visitor / user information when an individual visits a UCR web site, notice to that effect should be posted at the beginning of the session and should indicate what information will be collected and how it will be used.  Web site visitors / users should be allowed to terminate the session at that point without leaving data behind.

      5. Telephones.  In compliance with federal law, the University does not allow audio or video telephone conversations to be recorded or monitored without advising the participants, unless a court has explicitly approved such monitoring or recording and University policy is followed in the conduct of the monitoring or recording. Emergency services shall record 911-type emergency calls in accordance with federal and state laws and regulations.
      6. Radios.  Users of telecommunications radio frequency transmitters and receivers will operate in compliance with regulations of the Federal Communications Commission and appropriate University policy.

    4. Allowable Users.
      1. Faculty, Staff and Students.  All UCR employees (that is all faculty and staff) are allowable electronic communications resource users.
      2. All UCR enrolled students are allowable electronic communications resource users.  In some circumstances and for some campus systems, certain non-enrolled individuals (e.g. students who have graduated, prospective students, etc.) are considered allowable electronic communications resource users.

        Please see the Identity Management section of this document for additional information.

      3. Affiliate.  An affiliate is a person who is engaging in official campus business but does not have an entry in PPS (the campus payroll system).  This individual may be a consultant on contract, an auditor, or any other identified individual who, for the benefit of the university, should have access to authenticated electronic communications.  A responsible department official must approve affiliates in writing, and C&C will subsequently enable their access to electronic communications systems.
      4. Public Users.  Public users and organizations may only access campus electronic communications resources or services under programs sponsored by the UCR or any of its sub-units as authorized by the Chancellor (e.g. public patrons of the campus library may access the campus wireless network).
      5. PLEASE NOTE:  Usage of many UCR electronic resources is governed by license agreements with private vendors that exist to support campus research, teaching, and public service.  In general, authorized users of this licensed content include current UCR faculty, students, and staff and on-site public users of UCR electronic resources.  Systematic downloading of this licensed content, sharing of data with individuals at other institutions, making content available on openly accessible servers / web sites, and using such articles or information for commercial purposes are, in general, expressly prohibited by university practice and by vendor license agreements.

        Misuse of licensed electronic content could result in termination of the license and loss of the use of this material by the entire UCR community. In addition, users should be aware that publishers may monitor use of electronic resources to ensure that the terms of their license agreements are enforced.

      6. User Privacy of and Access to Electronic Information.  The University respects the privacy of electronic communications users as a core operating principle.  Managers of computing systems providing electronic communications services will not inspect, monitor, or disclose the content of electronic mail without the holder's consent except under specific circumstances as defined in the Access without Consent section of this document.
    5. Allowable Use.
    6. As a general guideline, allowable use of electronic communications falls into one of the following broad categories: one, creating web sites and electronic mailing lists; two, sending and receiving e-mail and accessing the Internet; three, making telephone calls; and four, use of electronic resources for the purposes of teaching, conducting research, public service, and/or conducting university business.

      As a general rule, electronic communications may not be used for the following: one, any illegal activities, including cyberstalking, digital copyright infringement, disrupting Internet and UCR intranet networks and systems (for example by transmitting viruses, sending spam, or hacking into others' transmissions or files), and tapping telephones; two, any activities that violate University policies, including policies on sexual and other harassment; three, any activities that utilize the University's name and/or seal without appropriate approvals; and four, any activities that utilize UCR electronic communications resources for commercial benefit.

      The following general guidelines should be utilized to determine if a particular application or use of a campus electronic communications resource is allowable:

      1. Purpose.  Electronic communications resources may be utilized by university departments, units, or sub-units in support of teaching, research, and public service as well as any administrative functions that support this mission.
      2. Non-Competition. UCR electronic communications resources shall not be provided to consumers or organizations outside the university except by approval of the Chancellor (or the Chancellor's designee). Such services shall support the mission of the university and not be in competition with commercial providers.
      3. Restrictions. University electronic communications resources may not be used for:
        1. Unlawful activities
        2. Commercial purposes not under the auspices of the university
        3. Personal financial gain
        4. Uses that violate other university or campus policies or guidelines (the latter include, but are not limited to, policies and guidelines regarding intellectual property and sexual or other forms of harassment).

      4. Representation.  Users of electronic communications resources must abide by appropriate statutes as well as UC and campus policies on the use of the University's name, seals, and trademarks.  Users of electronic communications resources shall not give the impression that they are representing or otherwise making statements on behalf of UCR or any department, unit, or sub-unit of the university unless appropriately authorized to do so.
      5. Endorsements.  Users of electronic communications resources must abide by UC and campus policies regarding endorsements.  References or pointers to any non-university entity contained within UCR electronic communications shall not imply university endorsement of the products or services of that entity.
      6. False Identity and Anonymity.  Users of University electronic communications resources shall not, either directly or by implication, employ a false identity (e.g. utilize the name or electronic identification of another).
      7. A user of University electronic communications resources may use a pseudonym (an alternative name or electronic identification for oneself) for privacy or other reasons, so long as the pseudonym clearly does not constitute a false identity.

        A user of University electronic communications resources may remain anonymous (the sender's name or electronic identification are hidden) except when publishing web pages and transmitting broadcasts.

      8. Interference.  University electronic communications resources shall not be used in a manner that could reasonably be expected to cause excessive strain on any campus electronic communications resource or unwarranted or unsolicited interference with others' use of electronic communications resources (examples include sending spam, engaging in denial of service attacks, etc.).
      9. Personal Use. University users of electronic communications resources may use these resources for incidental personal purposes provided that such use does not: one, directly or indirectly interfere with campus electronic communications operations; two, interfere with the user's employment or other obligations to the university; or three, burden UCR with noticeable incremental costs.  When noticeable incremental costs for personal use are incurred, users shall follow campus guidelines and procedures for reimbursement to the university.
      10. Accessibility.  All electronic communications resources intended to accomplish the academic and administrative tasks of the university shall be accessible to allowable users with disabilities in compliance with law and UC policies.
      11. Intellectual Property.  The use of all campus electronic communications resources must  conform to laws and UC policies regarding protection of intellectual property, including laws and policies regarding copyright, patents, and trademarks.
    7. Access Restrictions.
    8. Access to (and use of) campus electronic communications resources and services is a privilege provided at the discretion of the university.

      Access may be restricted under the following circumstances:

      1. When there is substantial reason to believe that violations of law (e.g. a DMCA violation) or UCR (or University) policies have taken place.
      2. When there are compelling circumstances (as defined in U.C. policy).
      3. When time-dependent, critical operational circumstances exist (as defined in U.C. policy, e.g. denial of services network attack)
    9. Special note relating to access restrictions.
    10. UCR's central information technology organization, Computing and Communication (C&C), employs network and security personnel who have the authority to evaluate the seriousness and immediacy of threats to UCR's information system resources and/or threats emanating from UCR to the Internet at large.  Based on the seriousness, immediacy, and potential cost to the university, C&C will take responsible and prudent actions to terminate the threat, therefore balancing the risk the threat poses to both UCR or the Internet as well as the potential negative effects restricting access will have to UCR's research, teaching, and public service mission (for example, balancing issues relating to shutting down network access from a research lab containing a computer that is attacking the Internet).  Examples of serious threats include the following:

      1. Excessive bandwidth use, enough to cause network performance degradation.
      2. Continued off-campus complaints with no response from on-campus responsible parties.
      3. Verified open proxy or open mail servers.
      4. Attacks observed by C&C's network monitoring systems.
      5. Verified DMCA violations.
      6. PLEASE NOTE: Actions to restrict will be governed by definitions for urgency, immediacy, etc. found in UC's Electronic Communications Policy.

    11. Access without Consent.
      1. Authorization.  In order to access electronic content without a user's consent, a request must be submitted to the Associate Vice Chancellor, Computing & Communications containing a reasonable explanation why such access is required.  This request will be evaluated and the situation assessed per UC policy and campus guidelines.   If warranted and appropriate, the AVC C&C will forward the request to an authorizing official for approval.  In all circumstances, reasonable attempts must be made to identify alternative means of accessing electronic communications prior to granting nonconsensual access to personal electronic information.
      2. Authorizing Officials:
      3. Faculty and Librarian records - Executive Vice Chancellor

        Staff and Affiliates - Vice Chancellor of Administration

        Students - Vice Chancellor of Student Affairs

      4. Reasons for Granting Access without ConsentAccess without consent shall be permitted under the following circumstances:
        1. When required and consistent with law
        2. When there is a substantiated reason such as: reliable evidence indicating a violation of law or UC polices has probably occurred (as distinguished from rumor, gossip, or other unreliable evidence)
        3. When there are compelling circumstances for which failure to act might result in significant bodily harm, significant property loss or damage, loss of significant evidence relating to violations of law or UC policies, or significant liability to UCR or to members of the university community
        4. When there are time-dependent, critical operational circumstances and when failure to act could seriously hamper the university's ability to function administratively or to meet its teaching or research obligations.
        5. PLEASE NOTE: Access without consent will be guided by definitions for compelling circumstances, critical operational circumstances, etc. found in UC's Electronic Communications Policy.

    12. Notes on Privacy.
      1. Privacy of and Access to E-mail Content. UCR recognizes that core University principles relating to academic freedom and shared governance, freedom of speech, and respect for privacy and confidentiality hold important implications for the management and use of electronic communications.
      2. With these core principles in mind, UCR does not routinely inspect, monitor, or disclose electronic communications without the holder's consent.

      3. Access by the Public. The California Public Records Act requires UCR to disclose various public records.  In response to requests for such disclosure, it may be necessary to access electronic communications records that users consider to be personal to determine whether they are public records that are subject to disclosure.  Such requests will be presented to Authorizing Officials as noted in this document.  Managers of systems who receive off-campus requests for disclosure of information should forward and coordinate such requests with the Associate Vice Chancellor of Computing and Communications.
      4. Sharing Contents of Electronic Communications Resources.
      5. In general, electronic communications resources are no longer considered private if either the sender or recipient voluntarily shares the content with a campus official or a manager of the computing system providing the electronic communication service in question.  This sharing of electronic content may occur if an individual is the recipient of unwanted or harassing messages or if the individual encounters a technical problem sending or receiving e-mail.  In such cases, campus staff will exercise discretion and professional judgment in sharing the content of the message(s).  Appropriate officials with whom electronic content may be shared include, but are not limited to, Human Resources and/or the Manager Labor Relations, the Academic Personnel Director, the Ombudsman, UCR's various Vice Provosts, Internal Audit, Equal Opportunity /Diversity, and the UCR Police.

      6. Maintenance Needs.  Information in e-mail "headers" such as sender, recipient, date and subject may be examined by staff in response to normal operational concerns (e.g. problems with the delivery of email, excessive copies of messages, or excessive length of messages).  Certain technical tools used in the management of computer systems may display the entire content of a file.  In such cases, staff will exercise professional judgment concerning viewing the file's contents.
    13. Terminations and Temporary Absences.
      1. Transfer or Termination of E-mail Service.  All UCR domain name addresses (@ucr.edu) are the property of UCR.  In general, users' access to electronic communication services (and in general, protections afforded users under the UC's Electronic Communications Policy) will be terminated as outlined in the table below.
      2. Situation

        Faculty

        Staff

        Students

        Affiliate

        Separation of Employment

        Visiting Post-Doc 30 days

        Non-Academic Senate 30 days

        Academic Senate 90 days

        30 days

        N/A

        N/A

        Retiree

        Lifetime E-Mail

        30 days

        N/A

        N/A

        Degree Award

        N/A

        N/A

        Three Academic Quarters

        N/A

        Separation of Affiliation

        N/A

        N/A

        N/A

        Immediate

        Termination from University Employment

        N/A

        Immediate

        N/A

        N/A

        Faculty, staff, and students using departmental or unit e-mail accounts (not C&C accounts) are subject to departmental and unit guidelines for use of these systems, providing such guidelines do not conflict with University policy. 

      3. Transferring E-mail Addresses.  When an employee transfers from one UCR department to another, the UCRnetID and UCRnetID@ucr.edu email address transfers with the employee.  For this reason UCR managers and other responsible departmental officials are encouraged to utilize generic email addresses for critical business functions.
      4. Temporary Absences and Separations.  Written approval to access an individual's e-mail (and other electronic information such as documents contained on a personal computer) should be obtained prior to an employee taking a temporary leave (e.g. vacation).  If written approval to access electronic content is not obtained prior to the temporary absence, university representatives may not read the e-mail records or access other electronic content. 
      5. If an employee is on temporary leave (e.g., vacation, leave of absence, etc.) and access to e-mail or other electronic content is required to sustain university operations, and the employee did not provide permission to access this data prior to beginning the temporary leave, the guidelines for non-consensual access contained in this document must be followed.

    14. Special note on DMCA.
    15. The distribution of copyrighted materials without permission (over the internet) can be a violation of federal law.  The law is known as the Digital Millennium Copyright Act of 1998 ("DMCA").  Much of the music, video, or games that are downloaded via programs like KaZaa or eDonkey2000 are distributed without the permission of the copyright owner, and thus these downloads are illegal.

      UCR students, staff, and faculty should be aware that colleges and universities must QUICKLY respond to DMCA related inquiries since ISPs (Internet Service Providers, like UCR) can be held liable for copyright infringement if they do not promptly resolve illegal distribution activities once they become aware of them.  As a result, UCR attempts to resolve DMCA queries in the most expeditious manner possible as soon as the campus is informed of a violation.

      Additional information concerning the DMCA and campus procedures and programs relating to the DMCA can be found at http://www.dmca.ucr.edu.

    16. Special note on SB1386.
    17. Senate Bill 1386 and Assembly Bill 700, effective July 1, 2003, added a new provision to the California Information Practices Act - Civil Code 1798.29, 1798.82.  This new provision requires any state agency (including the University of California) with computerized data containing personal information to disclose any breach of security of a system containing such data to any California resident whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person.

      This notice of a security breach must be provided to affected persons in the most expedient time possible and without unreasonable delay.

      Additional information concerning SB1386 and campus procedures and programs relating to its implementation can be found at http://www.cnc.ucr.edu/sb1386.

    18. Backups and logs.
    19. In order to provide a robust method of recovering from disasters, C&C performs nightly backups of campus electronic communications systems, including UCR's central e-mail servers.  The e-mail backups are based on a single image of the e-mail system and are not conducive to recovering individual files.

      UCR's backups are archived on local and remote systems with limited access; e-mail backu