STANDARD FOR INFORMATION SERVICES EXPECTATION OF PRIVACY

 

The University of Texas at San Antonio

Office of Information Technology

Office of Information Security (OIS) Standards

 

OIS 17 – Standard for Information Services Expectation of Privacy

 

 


I. STANDARD STATEMENT


The Standard for Information Services Privacy applies equally to all individuals granted access privileges to any UTSA information resource with the capacity to send, receive or store electronic mail.

 


 II. RATIONALE


This standard supports HOP Policy 8-12 Information Resources Use and Security Policy


 III. SCOPE


This standard applies to all UTSA faculty, staff, and students.

 


 IV. CONTACTS


If you have any questions about OIS 17 – Standard for Information Services Expectation of Privacy contact the following office:

 

The Office of Information Security

informationsecurity@utsa.edu

 

 


  IV. PROCEDURES  

1. Internal UTSA users (including faculty, staff, students, contractors and others) should have no expectation of privacy with respect to the use of information resources, except as provided in the  UTS165 Standard 14  of the University of Texas System. Electronic files created, sent, received or stored on computers and other information owned, leased, administered, or otherwise under the custody and control of UTSA, are not private. They may be accessed as needed for purposes of system administration and maintenance, for resolution of technical problems, for compliance with the Texas Public Information Act, subpoena, or court order and to perform audits.
2. Third parties have entrusted their information to UTSA for business, learning and professional purposes. All users must do their best to safeguard the privacy and security of this information. The most important of these third parties is the individual student. Student account data, protected health information and educational record data are confidential, and access will be strictly limited based on a business need for access.
 
3. To manage systems and to enforce security, the Office of Information Technology may log, review and otherwise utilize any information stored on or passing through the university's information systems in accordance with the provisions and safeguards provided in the UTS165 Standard 17.
 
4. In suspected cases of abuse of information resources, the contents of any e-mail or file may be reviewed in accordance with provisions defined in the Disciplinary Actions section of the Information Resources Use and Security Policy.

 

______________________________________________________________________________

Effective Date: January 1, 2012 Last Revised: March 18, 2016

 

<< Back