E-mail rules in brief



Similar documents
Rules in Brief. Every user has one or more roles the rules are partly different for e.g. the staff and the students

Acceptable Use of ICT Policy For Staff

Secure Frequently Asked Questions

Code of Practice for Users

REGULATIONS FOR THE USE OF CORPORATE ELECTRONIC MAIL SYSTEM BY STAFF OF THE STATE UNIVERSITY HIGHER SCHOOL OF ECONOMICS. 1. General Provisions

AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY " POLICY" Executive Director (AK) [J50]

E Mail Encryption End User Guide

Policy For Staff and Students

CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION

UNIVERSITY OF HOUSTON SYSTEM ADMINISTRATIVE MEMORANDUM. SECTION: Information Services NUMBER: 07.A.07

Management: A Guide For Harvard Administrators

Practical tips for managing e mail

Medina County Policy Manual

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Wakefield Council Secure and file transfer User guide for customers, partners and agencies

SECURE User Guide

Services Policy

ITS Policy Library Use of . Information Technologies & Services

AUBnet ( ) Accounts Policies

Executive Vice President of Finance and

Service Schedule for Business Lite powered by Microsoft Office 365

Webmail User Guide. New Outlook Mail Calendar Preferences. New Outlook

MICROSOFT OUTLOOK FUNCTION

About Your Policy Kit

Employees monitoring of information and communication technologies private usage Guidelines updated in Portugal

Secure Web Delivery. Ron Miller PIM Manager

The Bishop s Stortford High School Internet Use and Data Security Policy

CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING

Basics. Guidelines/Etiquette. Topics. Presented by: Software Training Services

Security Enhancements 3/9/15

Guidelines for Account Management and Effective Usage

STUDENT S INFORMATION SECURITY GUIDE

Using Your New Webmail

Secure User Guide

Chicago State University Computer Usage Policy

Secur User Guide

Introduction to . Jan 24 th 2010

Barracuda Spam Firewall Users Guide. Greeting Message Obtaining a new password Summary report Quarantine Inbox Preferences

EJGH Encryption User Tip Sheet of 8

BCSD WebMail Documentation

What browsers can I use to view my mail?

ALBANY MUTUAL TELEPHONE S MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION

Service Schedule for BT Business Lite Web Hosting and Business Lite powered by Microsoft Office 365

How to setup Outlook and Outlook Web Access (OWA) to give a send receipt and a read receipt (Options)

ELECTRONIC MAIL ( ) September Version 3.1

Published : License : None

User guide Business Internet features

COMPUTER USAGE -

OUTLOOK 2010 TIPS TABLE OF CONTENTS 1. SEND A BLIND CARBON COPY MARQUETTE UNIVERSITY IT SERVICES

Information Security Guide for Students

INFORMATION SECURITY GUIDE FOR STAFF

USE OF INFORMATION TECHNOLOGY FACILITIES

Titles. unexpected. video; learn. messages. When. responses. ugust Page 1

PANDA CLOUD PROTECTION User Manual 1

U.S. Bank Secure Mail

ModusMail Software Instructions.

UNIVERSITY OF ST ANDREWS. POLICY November 2005

Business Ethics Conduct Guide Best practice guidelines for using

Responsible Use of Technology and Information Resources

ITS Policy Library Use of . Information Technologies & Services

USING OUTLOOK WEB ACCESS

Privacy and Electronic Communications Regulations

2.1 It is an offence under UK law to transmit, receive or store certain types of files.

STATEMENT OF PURPOSE:

ADMINISTRATIVE POLICY #45-11(2015) COMMUNICATION VIA ELECTRONIC MAIL

Welcome to HomeTown Bank s Secure ! User Guide

Southern Law Center Law Center Policy #IT0004. Title: Policy

Information Management Advice 27 Managing

If you have any questions about any of our policies, please contact the Customer Services Team.

How To Use A College Computer System Safely

Guideline for Services

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

Data Protection Division Guidance Note Number 10/08

POLICY NO September 8, 2015 TITLE: INTERNET AND USE POLICY

Security Fort Mac

SPECIAL CONDITIONS FOR THE WEBSTORAGE CDN SERVICE Latest version dated 13/11/2013

Archiving Troubleshooting Guide

Archive Server for MDaemon Keep track of all your ! Save that information in a safe place and retrieve it in a snap.

SERVICE LEVEL AGREEMENT

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

MHA Service Level Agreement for Managed CRM

Introduction Configuration & Spam Detection WinWare Webmail Accounts Account Notes Definitions...

The online environment

Administrator s Guide 1.2

Policy Based Encryption Z. Administrator Guide

ITU Computer Network, Internet Access & policy ( Network Access Policy )

Training Manual. Version 6

Access and Privacy Considerations

SERVICE LEVEL AGREEMENT

ROCHESTER AREA SCHOOL DISTRICT

Exchange 2010 Outlook Web Apps (OWA) Features

Visitors to our website The LCTHF website collects information about each visitor in several ways. These may include:

Web Mail Classic Web Mail

How to Manage . Guidance for staff

TOWN OF COTTESLOE POLICY MANAGEMENT

The following Protective Markings are classified as Dissemination Limiting Markers (DLM).

FDIC Secure Procedures for External Users April 23, 2010

Encrypted Users Guide. Revised 6/8/2015

. Help Documentation. This document was auto-created from web content and is subject to change at any time. Copyright (c) 2013 SmarterTools Inc.

Secur User Guide

Transcription:

Tampere University of Technology E-Mail rules 1 (6) E-mail rules in brief Every e-mail user has one or more roles There are slightly different rules, for example, for staff members and students. All rules must be obeyed Use different passwords in the university services and in external services apply thorough consideration before using the university e-mail address for private purposes (see Rules of IT Service Use) if you mistakenly receive e-mail intended for someone else, forward the message to the correct recipient, and inform the sender of the mistake remember that the privacy of correspondence also applies to e-mail make sure you have enough free space in your mailbox don't distribute spam don't leave any private messages in the university mailbox when your user rights expire. Staff members Always use the university e-mail address for work-related correspondence send confirmations to e-service messages without any delay don't reroute work-related e-mail to external e-mail accounts keep your private and work-related messages separated, also the sent ones comply with the archive creation plan make sure your e-mail is monitored during your absence if you use an out-of-office message, instruct recipients to use the organisation address only use e-mail encryption methods approved by the University if you are about to leave the University's employ, transfer all e-mail messages that are relevant for the organisation to the responsible users before your user rights expire. Students Use the university e-mail account for study-related purposes you can forbid the University from publishing your e-mail address all messages sent and received in the role of a student are private if you have an employment contract with the University, you are also bound by the staff members' rules; moreover, you must keep your work- and study-related e-mail clearly separated. Mailing list owner Keep the list up to date (correct, valid addresses, brisk moderation) request the deletion of your list when it is no longer in use. Supervisor Make sure that all relevant organisation addresses are available make sure that the organisation addresses are used in your unit's communications appoint users responsible (with deputies) for monitoring the organisation addresses. Organisation address owner Establish procedures for message handling, back-up and informing other handlers

Tampere University of Technology E-Mail rules 2 (6) change the password of the organisation e-mail account regularly, and always after an e-mail handler (who knows the password) leaves the organisation. Further specifications to these rules are provided below. E-Mail rules Privacy of correspondence also applies to e-mail E-mail addresses These e-mail rules concern all users of the university's e-mail systems. The parts aimed at university staff members concern all of the University's units, their employees and other users in corresponding positions (such as scholarship-funded researchers and emeritus/emerita professors). The rules also concern all users responsible for e-mail systems. The e-mail rules comply with the currently valid laws and regulations. The sender is responsible for making sure that the message delivery has been successful. Particularly crucial messages should be sent well before the deadline, and the recipient should be asked to confirm receipt. If a user receives an e-mail message intended for another person, the unintended recipient is obligated to maintain the secrecy of the message and refrain from utilising its contents or the knowledge of its existence. According to the Administrative Procedure Act (434/2003), Section 21, a document delivered by mistake and dealing with administrative matters beyond the recipient's competence shall be transferred to the authority deemed to be competent, and the sender of the document shall be informed about the transfer; if such a transfer is not possible, the message shall be returned to the sender and deleted from the university's e-mail system all other received messages intended for another user must be returned to the sender. The forwarding and returning obligation does not concern messages containing malware or spam. The organisation address is an official e-mail address The organisation address is used for official matters and service provision. The organisation address is formed according to a certain formula, for example: university-level: office@tut.fi unit-level: unit@tut.fi role-level: rector@tut.fi The work e-mail is a personal e-mail account provided for work-related use Example: john.smith@tut.fi Work e-mail messages are related to both the work e-mail account and the user's job. As default, the University considers e-mail messages received to the work e-mail account to be private messages.

Tampere University of Technology E-Mail rules 3 (6) Use of e-mail and e-mail addresses In outgoing e-mail messages, the organisation address or the work e-mail address formed from the user's name must be given as the sender's address. The study e-mail is a personal e-mail account provided by the University for its students Example: john.smith@student.tut.fi The study e-mail account is primarily intended for study-related use. The University considers students' e-mail messages to be private messages. The sender's address in outgoing e-mail messages is the study e-mail address formed from the student's name. The student can forbid the publishing of his/her e-mail address outside the University. Every e-mail service user is personally responsible for keeping his/her mailboxes clean and ensuring that the reserved space does not run out. The University determines the e-mail addresses and their format TUT uses the following email address formats: organisation addresses are of the format service@tut.fi staff members' addresses are of the format john.smith@tut.fi students' addresses are of the format brian.virta@student.tut.fi Staff and student e-mail addresses are formed from the user's name If another user with exactly the same name joins the University, the original user's e-mail address changes according to TUT practices. The namesake users are informed of the situation. The existence of namesake users can be seen from email address, for example Brian Virta brian.virta@student.tut.fi and Brian John Virta brian.j.virta@student.tut.fi. The name-based address must be used as the personal e-mail address the organisation addresses are used in the university's communications the organisation address or work e-mail address must be used in workrelated matters. In public advertisements, brochures and similar publications the recommended presentation of email address is firstname.lastname@tut.fi or firstname.x.lastname@tut.fi. The handling and archiving of e-mail messages received to the organisation or work e-mail account are governed by the Act on the Openness of Government Activities and the university's archive creation plan. It is forbidden to transfer or automatically route e-mail messages from the organisation or work account outside the University; this is due to reasons related to information security, data protection and information management; in addition, it may constitute a breach of the Personal Data Act if a received message contains a confirmation request or is part of an e- service, the message handler must send the confirmation immediately only e-service systems are allowed to use automatic receipt confirmations.

Tampere University of Technology E-Mail rules 4 (6) Organisation addresses have owners The owner must make sure that messages received in the organisation address are handled on a regular basis and according to the archive creation plan, even when the owner is absent. E-mail messages received in the organisation account belong to the employer the address owner must respond to any received messages immediately the response must indicate that it is a reply to a message sent to an organisation address organisation addresses must not be used for personal communications. Messages related to work e-mail accounts are treated as private messages The University can retrieve and open an employee's e-mail messages in certain cases and certain ways as defined in separate guidelines work-related e-mail messages sent by employees must, when applicable, clearly indicate whether they are official statements related to work or the employee's personal opinions when responding to applications or other such matters related to public administration, the response message's reply address must be an organisation address o instead of changing the reply address, the sender can be advised to use the organisation address in the future o the original message and the response are transferred to the organisation address for archiving. The e-mail account provided by the University can be used for private purposes within the limitations set forth in the university's Rules of IT Service Use. Employees must clearly separate their personal and work-related e-mail messages, both those received and sent if a user is both a student and a staff member, the e-mail messages related to each role must be clearly separated from each other. External e-mail accounts must not be used for university-related tasks Access to external e-mail services from the university network can be technically restricted, if such services are deemed to form a major data security risk. Use personal auto replies with caution Auto replies entail a risk of spam flow, but if one is nevertheless deemed necessary, it should advise the recipient to contact the relevant organisation address. E-mail must be monitored even during absence One option is to close the mailbox (for example, during long leaves of absence). The recommended practice is to instruct clients to use the respective organisation address for all contacts. The e-mail account is fixed-term Personal messages should not be left in the university mailbox when the usage right expires. Employees must agree with their supervisor on the transfer of work-related messages to another user within the university organisation. If an employee resigns from his/her duties before the expiry of the employment contract, the

Tampere University of Technology E-Mail rules 5 (6) Service provisioning and administration employee, or his/her supervisor, can request the discontinuation of incoming e-mail immediately. E-mail messages can be encrypted All applications used for encrypting organisation- and work-related e-mail messages must be approved by the University. If a received organisation- or work-related e-mail message is encrypted so that only the recipient can decrypt it, the message must be decrypted immediately after receipt; this rule does not apply to messages containing malware or spam after decrypting, the message can be encrypted again so that all handlers can open it. In terms of information security, non-encrypted e-mail can be compared to a postcard. Mailing lists have owners The owner must keep the list moderated, regularly check that it is up-to-date and remove any redundant addresses from the list. The list owner is responsible for maintaining and removing joint mailing lists. Personal mailing lists are each user's own responsibility. A mailing list forms a person register and, hence, it may be subject to confidentiality obligations and separate limitations of disclosure. If such rules apply, use the blind carbon copy (bcc) function in order to keep the list's addresses hidden from recipients. Mass mailing and sending/forwarding chain letters is forbidden Exceptions to this rule can be made upon separate decisions. System administration can intervene in e-mail traffic in order to secure the service level or safety of the e-mail system. Such interventions, as well as e-mail usage monitoring and log-keeping, are governed by separate instructions. E-mail is checked and filtered All e-mail traffic goes through an automatic content analysis, based on which messages and attachments containing malware are automatically deleted the delivery of harmful, oversized or numerous attachments can be restricted. In addition, filtering and deletion without notification can be applied to messages sent from known spam servers classified as spam based on the automatic content analysis. The e-mail address no longer works when the usage authorisation has expired. Messages sent to a user whose e-mail account is no longer valid will not be delivered; instead, an automatic message is sent to inform the sender about the expiry of the address. When an e-mail account expires, all its re-routing arrangements also become invalid.

Tampere University of Technology E-Mail rules 6 (6) Other clauses Validity These e-mail rules become effective 1.8.2013 and replace the earlier version of corresponding rules. Change management These rules will be reviewed when needed to ensure that they comply with all valid services and laws. Any significant personnel-related changes are addressed according to the co-operation procedure. The head of IT management makes decisions concerning change needs. Information about changes is distributed using the regular communication channels, never personally. Deviations from the e-mail rules Permission for exceptions from the e-mail rules can be granted for compelling reasons upon a written application. Exceptional permits are granted by the head of IT management. The permits may include additional terms and conditions, restrictions and responsibilities. Monitoring Compliance with the e-mail rules is overseen by the IT management, as well as supervisors within their job descriptions. Breaches of the rules lead to sanctions according to the consequences of IT service abuse.