💾 Archived View for spam.works › mirrors › textfiles › computers › email captured on 2023-12-28 at 17:16:28.

View Raw

More Information

⬅️ Previous capture (2023-06-14)

-=-=-=-=-=-=-

Policies on electronic mail - a summary
---------------------------------------

Attached is an edited summary of the responses I received on my recent
query. 

The majority of respondents didn't have a formal mail policy, although
there was some unspoken agreement on it. 

At least one formal mail policy is attached. Some organisations seem
to have come to grips with the problem extremely well - as the following
(rough) quote from the Sun Microsystems internal handbook 'Email Survival'
illustrates.

'Accessing another persons personal electronic mail or files without 
their specific permission is considered gross misconduct. The ease with 
which this might be done in no way justifies this intrusion. Printed copy 
awaiting pickup from a printer is equally confidential  material. Any 
misconduct of this type may result in the termination of your employment
with Sun'.

Thanks to all who helped out. Also, some people requested anonymity
so I decided it would be best to strip out all identifying information
from the summary. If you would like to discuss something with any
particular correspondent, no doubt I can arrange it!

--
Todd Hooper (Postmaster)                                   Computing Centre
                                            Curtin University of Technology
Internet: hooper_ta@cc.curtin.edu.au                      Western Australia
ACSnet  : hooper_ta@cc.cut.oz.au
Phone   : +61 9 351 7467 (24 hour messaging system) Fax +61 9 351 2673

--- Comments from commercial site administrators and users ---

We take e-mail very seriously -- both on our own systems and on those that
we administer on behalf of our clients. I view e-mail in the same light as
paper mail. Accordingly, we make every effort to ensure timely delivery
and privacy. Our staff are encouraged to use the facility and we make no
distinction between business and personal correspondence.

We are sufficiently small that abuses of this privilege can be dealt with
at a personal level. In the three years that we've had network access,
only one user has been troublesome. In this case, the user was sending
inappropriate quantities of data via the e-mail system and that person has
been encouraged to seek alternative methods (magnetic media) of data
interchange.

So far, I have not found it necessary to formulate written policy on this
subject although recent activities that have been reported in the U.S.
have prompted me to consider doing so.

---

[1]  We're a commercial site, an employee-owned firm.

[2]  All email is private to the extent we can make it so under fairly
standard System V setups.  Directories for spooling are locked, although
a dedicated person could probably find a hole somewhere.  Privacy is
only knowingly compromised when a user needs file repair, and even
then the user is warned that someone will probably see the mailfile
or spooled message as surgery if performed.

[3]  We don't consider net-correspondence or personal routing to be a
problem.  In fact, we helped an employee figure out a path to his
daughter during the summer.

[4]  Nobody at our site has precipitated a net flame-war, so the issue
of abuse has not come up.  Were it to occur I suppose we would give
the party in question a reprimand on the first offense, and we would
have to handle additional problems on an ad-hoc basis.  We try to
be flexible; so far we haven't [KNOCK WOOD] had a major test.

--

This is certainly [not] an official educational mail policy, it is merely a
note reguarding my experience.

Although I realise that you, as a systems administrator, have a duty to
maintain security on your site, particularly now with AARNet connectivity,
I feel that the reading of someone elses personal mail is a gross injustice.
Despite the fact that you probably have every right to read the mail (they
have chosen to place them on your machine), it is degrading and leads to
animosity between staff and students.  As a sysadm myself now, I will
never read someones mail even if i suspect them of breaching security.

---

On mail abuse.  Of all organisational e-mail setups I've come
across (not that many, but I think sufficient to make correlation),
at least 30% of all intra-orgainisational email traffic is 
of a social nature.

In one instance, numerous mis/comms managers of a major international bank
that I've dealt with confessed, under social/relaxed settings that they
reckon more than 1/2 of all mail in their system were invitations, replies,
greetings and felicitations and such like.  They were using IBM/Profs and
a population of ~7000 users worldwide.

My thought: I don't think there is any feasible active policy 
you just have to rely on your employees to be professional about it.

--- Responses from academic site administrators and users ---

As far as we are concerned e-mail and e-news is there to be used, the more
students use it the better since they begin to use the computer systems
voluntarily.. not just to do their projects.
(some of them are even buyng e-mail accounts on commerical systems)

There aren't any charges or accounting..

---

I've had no problems here in ******.  Hopefull, the mail is
private.  there have been no rules set down for the use of
personal mail, and in fact one of the groups I use could
only be called personal.  The news also is personal I guess,
as alt.sex or such could hardly be called work!  (something
for tea breaks).

There is of course lots of official things passing through,
and who determines what is personal and what is strictly
university work?

---

No official policies at ******.  In general, anyone (staff or student) is 
permitted to use mail to anywhere.

Privacy - people are warned that mail is not secure and confidential
information should be sent by other means. 

Abuse - the universal threat: misuse of computer systems may result in
disabling of accounts (and consequent failure for students because of 
inability to complete assigned work.  We always warn people, and one warning 
has proven sufficient so far.) 

Personal messages - no rules, just the general statement that applies to 
computing generally "People doing University work have priority for use of 
terminals, etc".  This is sort of enforceable, in the sense that anyone 
wanting to use a terminal can complain to the person doing private work, and 
then to the system manager if necessary.  We rarely have complaints.  As far 
as checking for private mail, there are hundreds of messages a day go from 
here, and I don't have the time or inclination to read it.  I don't really see 
any problems with people sending private messages, after all, universities are 
supposed to be places of open thinking, etc, etc, etc.  (It would be different 
if it was costing us anything, such as people printing out dozens of 
invitations on our laser printer!)

---

.......................................There is no point in adopting
rules you cannot enforce.  In particular there is no way of enforcing rules
agains the use of email for personal messages unless you want to adopt the
distastful and tediously boring practice of reading all messages.

New computer users are given a statement describing their
computer access as a privilege, not a right, and with some guidelines as to
proper use.  There is always the implication that if they abuse their privileges
they can lose them.  If a user starts sending abusive email, you would probably
hear a complaint from the recipient and could take action.  If users send
multi-megabyte email messages you (or your postmaster) will probably see the
error messages when they bounce, and again can take appropriate action.  In
our case appropriate action is usually a warning, followed up by account
suspension in the rare cases of repeat offenders.

 As for privacy of email, I follow the practice that in principle email should
be private, but that in practice they should not assume this.  I post occasional
warnings that I as postmaster, and presumably postmasters at other sites, will
sometimes see a copy of their mail when an error occurs, sometimes due to no
fault of the sender.  I also inform users that system administrators technically
have access to all files on the system, and may occasionally need to read user
files to resolve system problems.

 My personal policy is to never divulge the contents of email I happen to see,
even when that email contents suggests gross abuse.  However I have no
such hesitation in divulging information obtained from system log files, which
list such information as sender and recipient addresses, message length, etc.
Since these log files are publicly readable (even though most users do not even
know they exist), I consider them public information.

---

There has been a discussion on TECHREP@BITNIC.BITNET on electronic mail
privacy/policy lately.  If you are not a TECHREP, I would suggest you
subscribe to TECHNEWS@BITNIC.BITNET as it is an open re-distribution of the
TECHREP list.

Send your subscription request to LISTSERC@BITNIC.BITNET in a mail message
with the first line  being "SUB TECHREP (or TECHNEWS) <Your Name>"

I enclosed a copy of a message that may be of intrest to you that appeared
earlier this week.....

=-=-=-=-=-=-=-=-=-=-=-= From SYSTEM NOTEBOOK C0 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=

>----------------------------Original message----------------------------
>On Tue, 30 Oct 90 15:03:22 GMT <GLWARNER@SAMFORD> said:
>>Could anyone tell me if there is a published statement concerning
>>the privacy or non-privacy rights of electronic mail on Bitnet?
>>
>>We are going to be granting access to all our students, and our
>>attorneys have suggested that we should have a published statement
>>concerning this matter.
>
>We are currently preparing a system/network usage policy document
>to inform our students (and other users) regarding what will be
>considered 'abuse', etc.  We plan on including these statements:
>
>
>                     *** IMPORTANT INFORMATION ***
>
>    Pursuant to the ELECTRONIC  AND  COMMUNICATIONS  PRIVACY  ACT of
>  1989, TITLE 18, UNITED STATES CODE, Sections 2510  and  following,
>  notice is hereby given that there  are  no  facilities provided by
>  this  system for sending or receiving confidential messages.   The
>  System Administrator and assigns  may  read all messages and files
>  of any user.
>
>
>    Computer accounts are paid for by the State of Texas and are for
>  educational  purposes   ONLY.  In   general  educational   use  is
>  interpreted loosely.  But, use  for economic  gain or  computer or
>  network  abuse will  not be  tolerated.  If there  is a  complaint
>  regarding your  usage of networks  or UTA computers,  UTA Academic
>  Computing   Services  has   the  right   and  will   review  trace
>  information, backups, and your  account contents to determine your
>  complicity. Possession  of command files  that are solely  for the
>  purpose  of pestering  other persons  or having  blatently obscene
>  material in your accounts, are generally considered just cause for
>  administrative action against you. You do NOT have a right to keep
>  these types of materials on UTA computers.
>
>
>We would appreciate any feedback on possible problems with these
>statements.
>
>Thanks,
>Bob Carr
>Manager of Systems Support
>UT Arlington
>

---

I'd be most interested in a summary.  The official policy at ***** is
that we have to use our computer accounts for "educational pursuits"
(or equally legal sounding stuff).  A fairly high level of privacy
exists, although the university reserves the right to read our email.

---

There are paragraphs alluding to many aspects of the e-mail issue
in various Internet RFC documents (I can't cite them by chapter and
verse off-hand, but one that comes to mind is the Security Policy
Handbook that is in fairly advanced draft right now ... it is
prepared by the Secuirty Policy Handbook Working Group (SPWG) and
you can get it by anonymous FTP from cert.sei.cmu.edu (look for
an "obvious" subdirectory).

Let me advance the following by way as a rough guess at to what you
will find:
(1) Many sites will have no official policies.
(2) Some sites will have official policies prepared to satisfy the
    legal staff and bean-counters: these policies will sound very
    nice and complete but in fact be largely impractical to
    implement.
(3) Some sites will have policies based on experience and knowledge
    of the technical staff: these policies will point out that e-mail
    ain't secure unless encrypted and that security is inversely
    proportional to ease and convenience of use of a system.

I suspect, too, that the top levels of administrations that tend to
think in terms of official policies, are also the ones who least
understand the technology and what really can and can't be done.

---

I am sysadmin of ********

We have 70+ users.

We have no policy in place.

Users are free to use email for whatever purpose they like.

and they do use it.

We use standard Unix mail which means each user's mailbox is private
with the exception of root, who can look at anyone's mail.

---

It was interesting that you should raise this on info-nets. So I
would like to share with you my thoughts on the subject, having worked
and researched in the human factor in global email since 1982.

I think that the coming of AARNet and the tremedous promotion work
that Geoff Huston and his group is doing will advance the use of
email in Australia. It mighe not be a good idea at this early stage
to insist that email should be used for "official" business, as it
will be extremely difficult to define what is official, work, and what
is personal and private use. To do so will dampen the learning and usage
enthusiasm of the lay people. I have been a member of a number of overseas
conferencing systems, and quite frankly, a lot of the messages have only
social values, but they are important all the same, as they are crucial
to group dynamcis and group affinity.

---

OK, here's the Dartmouth policy plus a disclaimer from the manual
for the Dartmouth-developed e-mail application:

         DARTMOUTH COLLEGE COMPUTING CODE OF ETHICS

The Computing Code of Ethics was formulated and is endorsed by
Dartmouth's Council on Computing, a faculty committee that
advises Dartmouth on questions of policy concerning the
allocation and use of all computing resources.  The council takes
an active role in determining the standard computing environment
on campus and participates in planning and reviewing projects
that will significantly affect computing at Dartmouth.  The
Council on Computing wholly endorses the Dartmouth Computing Code
of Ethics as follows:

Computer use.  The Computing Code of Ethics states that every
user of Dartmouth College Computing has two fundamental rights: 
privacy and a fair share of resources.  It is unethical for any
other user to violate these rights.  Violation of the Computing
Code of Ethics is considered a violation of the Academic Honor
Principle and may subject a student to disciplinary action.

Kiewit Network privacy.  Each user number and associated password
belongs to an individual, department, or school.  No one else
should use a user number without explicit permission from the
owner.  All use should be in accordance with Dartmouth policy on
computer use set forth in this document.  Owners accept the
burden for the responsible use and dissemination of their user
number.

Programs and files belong to the owner of the user number or
catalog containing the programs and files.  They are presumed to
be private and confidential unless the owner has explicitly made
them available to the public.  When necessary for the maintenance
of a system or network, Kiewit Computation Center personnel may
access others' files.

Some programs gather information about the users who run them. 
If such information could be used to identify the user and the
user's use of the program, the user should be warned and given a
chance to leave the program before data collection begins.

Use of a the network and/or electronic mail facilities for
transmitting rude, abusive, harassing, or malicious messages is
unethical.

Personally owned computer resources.  The unauthorized copying of
any software that is licensed or protected by copyright is theft
and thus unethical.

Programs and files that belong to the owner of a personal
computer enjoy the same rights of privacy afforded to programs
and files resident on the Kiewit Network computers.  They are
presumed to be private and confidential.

Resources.  No one should deliberately attempt to degrade Kiewit
system, network, or personal computer performance, nor to deprive
other users of the resources of or the authorized access to any
Dartmouth- or individually-owned computer.

Loopholes in the Kiewit computer system or network or knowledge
of a special password should not be used to damage computer
systems or networks, to obtain unauthorized resources, or take
resources from other users.

No Dartmouth-owned computing resource should be used for
unauthorized commercial purposes.

When necessary for the maintenance of a system or network, Kiewit
Computation Center personnel may restrict availability of shared
resources.

                   ELECTRONIC MAIL INFORMATION
           (Not Part of the Computing Code of Ethics)

Privacy information.  The privacy of electronic mail is somewhere
between that of a letter and a postcard.  Electronic mail is not
entirely confidential.  There may be instances where the
postmaster may have to gain access to a message to determine if
something is wrong with the address, or the message may be
delivered inadvertently to the wrong address.

--

I'm the postmaster here for the Department of Computer Science,
and thus for a bunch of student systems as well as the staff network.
We don't really have an official policy that I know of for electronic
mail, but I think some of the unofficial ideas we've been working with
may be of interest to you. I'm interested in any other replies you
receive, so if you don't get enough to post to the net, could you email
me a copy please ?

During the period ******* through to *******, network access for students was 
completely open. They were allowed to send mail anywhere they liked, and 
FTP from the States, telnet into machines over there and try to break into
people's computers :-(.

At some point this "feature" was mentioned to the bigwigs here, who
immediately determined that undergraduate students should not have
AARnet access. The very idea of undergrads being able to send mail
overseas was quite unthinkable. Naturally, the implementation of such a
restriction required a bit of thought, because students do need access
to utilities like telnet and so on to communicate between machines on
campus. Eventually we decided to try not running routed on the
machines, thereby making attempts to reach systems outside the
physically connected network return the message : Network unreachable.

This has been fairly successful, although because our campus network is
subnetted, we have needed on occasion to add a special static route
into Multigate boxes to talk to Macintosh labs and so on. The one big
disadvantage of it is that no-one on the machine can reach off camous,
so staff users can't mail overseas from such a crippled machine, for
instance. Apart from trying to follow the commandments of the
powers-that-be, we were also pleased to be able to stop students from
FTPing vast numbers of raster images from US sites. (Since disk quotas
were mistakenly not turned on at the beginning of the semester, I mean
VAST numbers).

In any case, although I've never sighted an "official" policy or even
an official memo telling us what we should and should not let the
students do, I thought you might find what we've been doing
interesting, since it is my vague understanding that not many other
AARnet member sites are restricting student access (?). 

[deleted]

Your message also mentions other issues such as mail abuse, privacy of
mail etc. Again we don't seem to have a clearcut official policy
although we do have a "Principles of Responsible Use" document which
students are expected to pay some attention to. It explicitly says
"users should not...attempt to intercept any network communications,
such as electronic mail...".  It goes on to say "Actions taken by users
intentionally to interfere with or alter the integrity of the system
are out of bounds. Such actions include ...impersonation of other
individuals in communications...". I think that this document is a
locally written thing, and isn't circulated to the other larger student
site on campus.

As far as privacy of mail goes, I was quite surprised to hear most of
our lecturers agreeing that as far as they were concerned, students'
mail was an "open book". Some of the first year lecturers in particular
are very concerned with plagiarism, and seem to often browse through
student mailboxes to try and detect it. I'm pretty sure that they want
to treat it as an open book, but have no intention of telling the
students that that is the case. As a postmaster, my immediate reaction
is that such an attitude is rather unethical.