Section: Information Technology
Policy Number: 906Responsible Office: Information Technology
Effective Date: 5/1/19Revised: 5/1/19; 6/11/20
This policy document describes how to safeguard the provided St. John’s University (St. John’s) email service. It applies to all use of these services whatever the means or location of access (e.g. via mobile devices or outside of the office).
This policy applies to the University Community. Adherence to this policy helps safeguard the confidentiality, integrity, and availability of the St. John’s information assets, and protects the interest of St. John’s, its customers, personnel, and business partners.
Email is a vital business tool for communicating both internally and with customers and suppliers. However, due to its flexibility and general availability, the use of electronic messaging carries with it several significant risks and all users must remain vigilant and adopt good practice when sending and receiving messages. It is therefore imperative to minimize the attack surface and the opportunities for attackers to manipulate human behavior and conduct cyber-attacks like social engineering to users interacting with web browsers and email systems.
St. John’s provided electronic messaging facilities are used when communicating with others on official business. Personal accounts must not be used for this purpose. Guidelines on the sending of classified information via electronic messaging are always observed.
Employees, faculty, staff, students, and contractors must not send or receive information that contains Personally Identifiable Information (PII). In addition, St. John’s blocks all electronic messages containing SSN, Tax ID Number, bank account information or credit card information with Data Loss Prevention (DLP) in place.
The following are definitions relevant to the policy:
St. John’s reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy. Instances of non-compliance must be presented to, reviewed, and approved by the CIO, the Director of Information Security, or the equivalent officer(s).
All breaches of information security, actual or suspected, must be reported to, and investigated by the CIO and the Director of Information Security.
Those who violate security policies, standards, or security procedures are subject to disciplinary action up to and including loss of computer access and appropriate disciplinary actions as determined by St. John’s.