{"id":2517,"date":"2025-04-25T15:51:24","date_gmt":"2025-04-25T15:51:24","guid":{"rendered":"https:\/\/www.tarleton.edu\/technology\/?page_id=2517"},"modified":"2025-04-25T15:53:28","modified_gmt":"2025-04-25T15:53:28","slug":"tarleton-oits-email-use-standard","status":"publish","type":"page","link":"https:\/\/www.tarleton.edu\/technology\/tarleton-oits-email-use-standard\/","title":{"rendered":"Tarleton OITS Email Use Standard"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h1 class=\"wp-block-heading\">Tarleton Office of Innovative Technology Solutions (OITS) <br> Email Use Standard<\/h1>\n\n\n\n<p>Effective: February 11, 2020<\/p>\n\n\n\n<p>Revised:&nbsp; April 25, 2025&nbsp;<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image alignright size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2021\/12\/Tarleton_TonTexas.svg\" alt=\"The Tarleton State University logo\" class=\"wp-image-670\" style=\"width:159px;height:auto\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator alignfull has-alpha-channel-opacity has-vivid-cyan-blue-to-vivid-purple-gradient-background has-background is-style-wide\" \/>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Procedure Summary<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Tarleton State University\u2019s (Tarleton or university) information resources are strategic assets which, as property of the State of Texas, must be managed as valuable state resources in accordance with <a href=\"https:\/\/statutes.capitol.texas.gov\/Docs\/GV\/htm\/GV.2054.htm\">Texas Government Code Chapter 2054<\/a>. Since a large portion of Tarleton business is conducted using email, it is important that email services function in an efficient and reliable manner. This standard, therefore, addresses expected standards for university email usage.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group word-wrap: normal is-layout-flow wp-block-group-is-layout-flow\">\n<p>This standard provides information regarding the use of email through university owned information resources. The purpose of the implementation of this standard is to provide a set of measures that will mitigate information security risks associated with email use. There may also be other or additional measures that will provide appropriate mitigation of the risks. The assessment of potential risks and the application of appropriate mitigation measures are to be determined by the information resource owner or their designee. In accordance with <a href=\"https:\/\/texas-sos.appianportalsgov.com\/rules-and-meetings?chapter=202&amp;interface=VIEW_TAC&amp;part=10&amp;title=1\">Texas Administrative Code (TAC) Chapter 202 \u2010 Information Security Standards<\/a>, each department and\/or resource owner may elect not to implement some or all of the risk mitigation measures provided in this standard based on information security risk management decisions and business functions. Such risk management decisions must be documented and reported to the designated information security officer. <\/p>\n\n\n\n<p>This standard administrative procedure (SAP) applies to any Tarleton employee, third-party vendor, student, guest, or visitor that may use any university information resource that has the capacity to send, receive and\/or store email.&nbsp;<\/p>\n\n\n\n<p>Please see the Tarleton Security Controls Catalog, specifically the <a href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/access-control-ac\/ac-2-account-management\/\">Access Control (AC)<\/a>, <a href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/system-and-communications-protection-sc\/sc-8-transmission-confidentiality-and-integrity\/\">System and Communications Protection (SC)<\/a>, and <a href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/assessment-authorization-and-monitoring-ca\/ca-3-information-exchange\/\">Assessment, Authorization, and Monitoring (CA)<\/a> families, for additional information and requirements.<\/p>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Procedures and Responsibilities<\/strong>&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list its-nested-list\">\n<li>The following activities are prohibited:&nbsp;&nbsp;\n<ul class=\"wp-block-list\">\n<li>Sending email that is intimidating or harassing;&nbsp;&nbsp;<\/li>\n\n\n\n<li>Using email for conducting personal business;<\/li>\n\n\n\n<li>Using email for purposes of political lobbying or campaigning;&nbsp;&nbsp;<\/li>\n\n\n\n<li>Violating copyright laws by inappropriately distributing protected works;&nbsp;&nbsp;<\/li>\n\n\n\n<li>Posing as anyone other than oneself when sending email, except when authorized to send messages for another user based on job duties or when serving in a support role; and&nbsp;&nbsp;<\/li>\n\n\n\n<li>The use of unauthorized email software.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>The following activities are prohibited because they impede the functioning of network communications and the efficient operations of electronic mail systems:&nbsp;&nbsp;\n<ul class=\"wp-block-list\">\n<li>Sending or forwarding chain letters;&nbsp;&nbsp;<\/li>\n\n\n\n<li>Sending unsolicited messages to large groups except as required to conduct university business;&nbsp;&nbsp;<\/li>\n\n\n\n<li>Sending excessively large messages;&nbsp;and<\/li>\n\n\n\n<li>Sending or forwarding email that is likely to contain computer viruses.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>All sensitive and\/or confidential Tarleton material transmitted over an external network should be encrypted.&nbsp;&nbsp;<\/li>\n\n\n\n<li>All user activity on Tarleton information resources and\/or assets is subject to monitoring and review.\u00a0\u00a0<\/li>\n\n\n\n<li>Electronic mail users must not give the impression that they are representing, giving opinions, or otherwise making statements on behalf of Tarleton or any unit of the university unless appropriately authorized (explicitly or implicitly) to do so. Where appropriate, an explicit disclaimer will be included unless it is clear from the context that the author is not representing Tarleton. An example of a simple disclaimer is: \u201cthe opinions expressed are my own, and not necessarily those of my employer.\u201d&nbsp;&nbsp;<\/li>\n\n\n\n<li>Individuals must not send, forward or receive confidential or sensitive Tarleton information through non\u2010Tarleton email accounts. Examples of non\u2010Tarleton email accounts include, but are not limited to: Hotmail, Gmail, Yahoo mail, AOL mail, and email provided by other Internet Service Providers (ISP).&nbsp;&nbsp;<\/li>\n\n\n\n<li>Auto\u2010forwarding, including mailbox or smtp forwarding, shall not be used to send or forward any email from internal staff\/faculty\/student worker email accounts to non\u2010Tarleton email accounts\/domains.  Any exceptions to this must be reviewed and approved by the Tarleton Information Security Officer (ISO)\/Chief Information Security Officer (CISO). &nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Definitions<\/h2>\n\n\n\n<p><strong>Confidential Information<\/strong>: information that is excepted from disclosure requirements under the provisions of applicable state or federal law, e.g. the Texas Public Information Act.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Information Resources (IR)<\/strong>: the standards, equipment, and software that are designed, employed, operated, and maintained to collect, record, process, store, retrieve, display, and transmit information or data.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Information Security Officer (ISO) \/ Chief Information Security Officer (CISO)<\/strong>: responsible for administering the information security functions within the university and reports to the information resources manager (IRM).&nbsp;&nbsp;<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Related Statutes, Policies, or Requirements<\/strong>&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/policies.tamus.edu\/29-01.pdf\">TAMUS Policy 29.01, Information Resources<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/policies.tamus.edu\/29-01-02.pdf\">TAMUS Regulation 29.01.02, Use of Licensed Software<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/policies.tamus.edu\/29-01-03.pdf\">TAMUS Regulation 29.01.03, Information Security<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/policies.tamus.edu\/29-01-04.pdf\">TAMUS Regulation 29.01.04, Accessibility of Electronic and Information Resources<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/policies.tamus.edu\/29-01-05.pdf\">TAMUS Regulation 29.01.05, Artificial Intelligence<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/policies.tamus.edu\/29-01-06.pdf\">TAMUS Regulation 29.01.06, Covered Applications and Prohibited Technologies<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.tarleton.edu\/policy\/wp-content\/uploads\/sites\/142\/2022\/06\/29_01_03_T0_01.pdf\">Tarleton SAP 29.01.03.T0.01, Information Resources &#8211; Acceptable Use<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.tarleton.edu\/policy\/wp-content\/uploads\/sites\/142\/2022\/06\/29_01_99_t1.pdf\">Tarleton Rule 29.01.99.T1, Information Resources<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.tarleton.edu\/security-controls-catalog\/\">Tarleton Security Controls Catalog<\/a><\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contact Office<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Office of Innovative Technology Solutions&nbsp;<\/p>\n\n\n\n<p>AVP and CIO of Innovative Technology Solutions&nbsp;<\/p>\n\n\n\n<p>254-459-5685&nbsp;<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tarleton Office of Innovative Technology Solutions (OITS) Email Use Standard Effective: February 11, 2020 Revised:&nbsp; April 25, 2025&nbsp; Procedure Summary&nbsp; Tarleton State University\u2019s (Tarleton or university) information resources are strategic &#8230;<\/p>\n","protected":false},"author":94,"featured_media":580,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-fullwidth.php","meta":{"_acf_changed":false,"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"class_list":["post-2517","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"coauthors":[],"author_meta":{"author_link":"https:\/\/www.tarleton.edu\/technology\/author\/jgeorge\/","display_name":"jgeorge"},"relative_dates":{"created":"Posted 12 months ago","modified":"Updated 12 months ago"},"absolute_dates":{"created":"Posted on April 25, 2025","modified":"Updated on April 25, 2025"},"absolute_dates_time":{"created":"Posted on April 25, 2025 3:51 pm","modified":"Updated on April 25, 2025 3:53 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/pages\/2517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/users\/94"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/comments?post=2517"}],"version-history":[{"count":3,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/pages\/2517\/revisions"}],"predecessor-version":[{"id":2521,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/pages\/2517\/revisions\/2521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/media?parent=2517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}