Email Unacceptable Uses | JCTC

Technology Solutions

Email Unacceptable Uses

3.3.21.4.2 KCTCS Unacceptable Uses Policy

Since e-mail provides for peer-to-peer communications between participants, it also has great potential for misuse.

Use of KCTCS e-mail resources is a privilege that may be revoked at any time for inappropriate conduct.

Any abuse of acceptable use policies is considered gross misconduct and may result in revocation of access, notification of KCTCS management, and disciplinary action up to and including dismissal.

Examples of inappropriate conduct include, but are not limited to:

  • a). Accessing another individual s personal e-mail or files without their specific permission is considered gross misconduct. No one has authority to read another person s e-mail unless explicitly given authority to do so by the owner of that e-mail
  • b). Using e-mail for personal gain or personal business activities in a commercial connotation such as buying or selling of commodities or services with a profit motive
  • c). Using e-mail for any illegal purposes, including initiating or receiving communications that violate any laws and regulations, including KRS 434.840-434.860 (Unlawful Access to a Computer) and KRS 512.020 (Criminal Damage to Property Law). This includes malicious use, spreading of viruses, and hacking. Hacking means gaining or attempting to gain the unauthorized access to any computers, computer networks, databases, data or electronically stored information.
  • d). Using e-mail for transmitting statements, language, images or other materials that are reasonably likely to be perceived as offensive or disparaging of others based on race, national origin, sex, sexual orientation, age, disability, religious or political beliefs.
  • e). Using abusive or objectionable language in either public or private messages.
  • f). Using e-mail for disseminating, soliciting or storing sexually oriented messages or images.
  • g). Misrepresenting, obscuring, suppressing, or replacing a user s identity in e-mail. This includes the use of false or misleading subject headers and presentation of information in the distribution of e-mail.
  • h). Using e-mail for sending or forwarding chain letters.
  • i). Distributing or forwarding unsolicited commercial e-mail.
  • j). Using e-mail for soliciting money for religious or political causes, or advocating religious or political opinions.
  • k). Using e-mail to distribute personal information to include any information that constitutes an unwarranted invasion of personal privacy as defined in the Kentucky Open Records Act, KRS 61.870 or other state and Federal laws.
  • l). Using e-mail for copying, disseminating or printing copyrighted materials (including articles, images, games, or other software) in violation of copyright laws.
  • m). Using e-mail for other non-business related activities that will cause congestion, disruption of networks or systems including e-mail attachments.