Thomas Jefferson University

Main menu:

Electronic Communications & Information

Computer hardware, software and other equipment which support and facilitate voice mail, electronic mail and access to the Internet are the property of the University and these systems are intended only for business-related purposes. Incidental use for personal reasons is permitted provided that such usage is on personal time, has supervisory permission, and does not conflict with provisions stated elsewhere in this policy or in related University policies.

Examples of Prohibited Activities

The following is a list of explicitly prohibited actions or uses of University-owned electronic communication and information resources. This is provided for administrative purposes only, and is not intended to include all possible violations.

  • Copying University-owned or licensed software programs to another computer without prior approval;
  • Using University-owned equipment or networks to obtain, utilize, copy or distribute software or data which the employee, faculty member or student does not personally have the rights to or own;
  • Using University-owned equipment or networks to attempt to enter (break into) other computing systems or resources to which the employee, faculty member or student does not have authorized access;
  • Using University-owned equipment or networks to damage, disrupt, or interfere with the normal operation of University or other computers or communications equipment;
  • Using University-owned equipment or networks to invade the privacy of an individual by accessing or attempting to access confidential information (e.g., voice mail, E-mail files);
  • Using University-owned or operated equipment and software (e.g., E-mail) to abuse, harass or threaten another individual;
  • Forging electronic information by altering or deleting the attribution of origin, or sending messages under someone else's E-mail address;
  • Using University-owned equipment or software in the commission of a crime;
  • Using University-owned equipment or software for commercial purposes unrelated to the mission of the University;
  • Sharing user names and passwords with another individual to allow restricted databases or other licensed electronic products to be made available to unauthorized users.

Conduct in violation of the principles set forth above may be subject to criminal or civil legal action as well as University disciplinary action.

Click to view the complete Electronic Communications and Information Policy.