General

This section implements CSU Information Security Policy 8030.00.

Employee Privacy Expectations

The University cannot guarantee the security of information transmitted via electronic or voice mail. Each person using the University network should be aware that, depending on the level of protections taken, information transmitted over the network could be intercepted and altered by others.

In accordance with University policy and applicable State and Federal laws, ITS personnel may monitor or access communications transmitted via or stored on the University network. As such, there is no reasonable expectation of privacy for such information unless the information is stored and transmitted in encrypted form.

Responsible Use of ITS Resources

Each person using ITS resources must comply with the University Statement on Responsible Use of Information Assets. The malicious or intentional misuse of ITS resources may result in disciplinary action up to and including termination of employment, and possible civil or criminal liability.

Compliance and Contractual Obligations

The University requires employees with access to protected data to certify that they will protect the confidentiality, integrity, and availability of that data, and that they understand that the misuse of protected personnel data may result in disciplinary action up to and including termination of employment and possible civil or criminal liability.

Back to Top ↑
©