STANDARD FOR INFORMATION SERVICES EXPECTATION OF PRIVACY
The University of Texas at San Antonio
Office of Information Technology
Office of Information Security (OIS) Standards
OIS 17 – Standard for Information Services Expectation of Privacy
I. STANDARD STATEMENT
The Standard for Information Services Privacy applies equally to all individuals granted access privileges to any UTSA information resource with the capacity to send, receive or store electronic mail.
This standard supports HOP Policy 8-12 Information Resources Use and Security Policy
This standard applies to all UTSA faculty, staff, and students.
If you have any questions about OIS 17 – Standard for Information Services Expectation of Privacy contact the following office:
The Office of Information Security
1. Internal UTSA users (including faculty, staff, students, contractors and others) should have no expectation of privacy with respect to the use of information resources, except as provided in the UTS165 Standard 14
of the University of Texas System. Electronic files created, sent, received or stored on computers and other information owned, leased, administered, or otherwise under the custody and control of UTSA, are not private. They may be accessed as needed for purposes of system administration and maintenance, for resolution of technical problems, for compliance with the Texas Public Information Act, subpoena, or court order and to perform audits.
2. Third parties have entrusted their information to UTSA for business, learning and professional purposes. All users must do their best to safeguard the privacy and security of this information. The most important of these third parties is the individual student. Student account data, protected health information and educational record data are confidential, and access will be strictly limited based on a business need for access.
3. To manage systems and to enforce security, the Office of Information Technology may log, review and otherwise utilize any information stored on or passing through the university's information systems in accordance with the provisions and safeguards provided in the UTS165 Standard 17
4. In suspected cases of abuse of information resources, the contents of any e-mail or file may be reviewed in accordance with provisions defined in the Disciplinary Actions section of the Information Resources Use and Security Policy
Effective Date: January 1, 2012 Last Revised: March 18, 2016