Use of Electronic Mail Policy

74 KB | 3 files | null PDF,null DOC

This sample policy will help you set standards within your organization to help users and the enterprise avoid consequences of misusing power of e-mail. This policy actually spells out sanctions that can be applied for e-mail abuse.

E-mail has proven to be an extremely valuable tool in solving communication problems. But, it can also create a few problems of its own if standards for appropriate use within an organization aren't created, put in place and enforced.

This document, provided by Indiana University, outlines the on- and off-campus university policy regarding use of electronic mail and includes the following:

  • Policy Rationale
  • Policy Statement
  • Procedure Reference
  • Definitions
  • Sanctions

This policy applies to all users of Indiana University information technology resources, regardless of affiliation.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Use of Electronic Mail.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Indiana University's University Information Policy Office is charged with: •IT policy development, dissemination and education •Information usage/management policy development and education •Review and analysis of existing policies for continued applicability and effectiveness •Interpretation of current policy related to specific issues, situations and incidents •Coordinating response to incidents of inappropriate use of information or IT •Interaction with computer security officers to develop and administer security education and awareness programs, and to assist with investigation of computer security incidents •Administration of University computer accounts

All IT Downloads from IUUIPO» | Visit IUUIPO »
Related IT Downloads

Framework for Designing Cryptographic Key Management Systems Framework for Designing Cryptographic Key Management Systems

Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification....  More >>

Database Encryption Readiness Assessment Database Encryption Readiness Assessment

Determine if data encryption is a fit for the company's critical information....  More >>

Computer Forensics Overview Computer Forensics Overview

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.