Skip Navigation
Skip to Menu Toggle Button
UMGC Policy X-1.26

Electronic Mail

Policy CategoryPolicy OwnerVersion Effective DateReview CyclePolicy Contact
X. Information Governance, Security & TechnologyChief Transformation OfficerAug. 29, 2023Every 2 years UMGC Information Security
  1. Purpose
    The purpose of this policy is to establish information security standards and related University policies for electronic mail (“e-mail”) use and e-mail processes relevant to University of Maryland Global Campus ("UMGC" or "University") Information Technology Resources.
  2. Scope and Applicability
    This Policy applies to:
    1. All e-mail services provided, owned, or funded in part or in whole by the University.
    2. All Users and account holders of the University e-mail systems or accounts, regardless of intended use.
  3. Definitions
    Defined terms are capitalized throughout this Policy and can be found in the Information Governance Glossary.
  4. Specific Use of Electronic Mail
    1. E-mail services are extended for the sole use of University faculty, staff, students, and other authorized users to accomplish tasks related to and consistent with the University's mission. Any e-mail address or account assigned by the University to individuals, sub-units, or functions of the University is the property of the University.
    2. E-mail users are required to comply with state and federal laws, University policies, and normal standards of professional and personal courtesy and conduct. Access to University e-mail services is a privilege that may be wholly or partially restricted by the University without prior notice and without the consent of the e-mail user: (a) when required by and consistent with applicable law or policy; (b) when there is a reasonable suspicion that violations of policy or law have occurred or may occur; or (c) when required to meet time-dependent, critical operational needs.
    3. When a User's affiliation with the University ends, the University may attempt to redirect an e-mail to another internal University e-mail address for a reasonable period of time as determined by the University for purposes consistent with this policy and the University's mission. The University may elect to terminate the individual's e-mail account or continue the account, subject to approval by appropriate University supervisory and systems operational authority.
    4. E-mail that contains Personally Identifiable Information (PII) or Controlled Unclassified Information (CUI) is only permissible for valid business reasons and appropriate security controls such as e-mail encryption must be taken.
    5. Manual or Auto-forwarding UMGC specific e-mail from a University managed e-mail system to an external e-mail system is prohibited unless properly authorized by University department leadership.
    6. Users are required to comply with University requests for access to and copies of e-mail records when access or disclosure is required or allowed by applicable law or policy, regardless of whether such records reside on a computer housed or owned by the University.
    7. Using e-mail for illegal activities is strictly prohibited. Illegal use may include, but is not limited to obscenity; child pornography; threats; harassment; theft; attempting unauthorized access to data or attempting to breach any security measures on any electronic communications system; attempting to intercept any electronic communication transmissions without proper authority; and violation of copyright, trademark, or defamation law.
    8. University e-mail services shall not be used for purposes that could reasonably be expected to cause, directly or indirectly, strain on any computing facilities or interference with others' use of e-mail or e-mail systems. Such uses include, but are not limited to, the use of e-mail services to:
      1. Send or forward chain letters.
      2. "Spam"; that is, to exploit listservs or similar systems for the widespread distribution of unsolicited mail.
      3. "Letter-bomb"; that is, to resend the same e-mail repeatedly to one or more recipients.
    9. University e-mail services may be used for incidental personal purposes provided that such use does not:
      1. Directly or indirectly interfere with the University operation of computing facilities or e-mail services.
      2. Interfere with the e-mail user's employment or other obligations to the University.
      3. Violate this policy, or any other applicable policy or law, including but not limited to, use for personal gain, conflict of interest, harassment, defamation, copyright violation, or illegal activities.
    10. E-mail messages arising from such personal use shall, however, be subject to access consistent with this policy or applicable law. Accordingly, such use does not carry with it a reasonable expectation of privacy.
    11. The confidentiality of e-mail cannot be assured, and any confidentiality may be compromised by access consistent with applicable law or policy, including this policy, by unintended redistribution, or due to current technologies inadequate to protect against unauthorized access. Users, therefore, should exercise extreme caution in using e-mail to communicate confidential or sensitive matters, and should not assume that their e-mail is private or confidential.
    12. Users are responsible for safeguarding their login credential (UserID) and password, and for using them only as authorized. Users are responsible for all e-mail transactions made under the authorization of their UserID.
  5. Exceptions
    Exceptions to this policy should be submitted to Information Security for review and approval. If an exception is requested a compensating control or safeguard should be documented and approved.
  6. Enforcement
    1. Use e-mail in accordance with UMGC Policy X-1.12 Acceptable Use. Failure to adhere to this policy subjects you to the enforcement as outlined in the policy.
    2. Any Employee, Contractor, or third-party performing duties on behalf of the University with knowledge of an alleged violation of this policy should notify Information Security as soon as practicable.
  7. Standards Referenced
    1. USM IT Security Standards, v.5, dated July 2022
    2. NIST SP 800-171r2 “Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations,” dated February 2020.
    3. Cybersecurity Maturity Model Certification (CMMC), v.2.0, December, 2021
  8. Related Policies
    1. UMGC X-1.02 Data Classification
    2. UMGC X-1.04 Information Security
    3. UMGC X-1.10 Identity and Access Management
    4. UMGC X-1.12 Acceptable Use
  9. Effective Date: This policy is effective as of the Version Effective Date set forth above.