In connection with the University’s migration to Office 365, the University adopted a policy of retaining
copy of each fdu.edu email for three (3) years. This means, regardless of individual user action, the
University will maintain a copy of all email traffic for a period of 3 years.
In the event of lost or damaged files, a reasonable attempt will be made to recover the information;
however, the University and the University Information Technology staff cannot guarantee recovery of the
data or loss of data due to media failure, floods, fires, etc.
OIRT and each of its departments will make reasonable attempts to provide error-free hardware and
software on our computing resources, however, it is not possible to guarantee this, and information
provided by staff members is not guaranteed to be correct.
PRIVACY
Users should exercise caution when storing any confidential information in electronic format, because the
privacy of such information cannot be guaranteed. User(s) must be aware that any personal files,
including e-mail, maintained on University computing resources are University property and are subject to
University storage, retrieval, and review. Individuals using FDU computing resources should have no
expectation that any information transmitted through or stored on FDU computing resources, whether the
information is contained on a computer hard drive, computer disks, University or third party server or in
any other manner, will be private. By using FDU computing resources, the user consents to the
University’s (and its designees’, both internal and external) access to their electronic files, documents,
and materials stored, transmitted, or otherwise accessible on those resources.
Examples of where the University might access a user’s electronic files include system backups, which
access all files in a user's account; software upgrades which may require editing startup files in a user's
account; diagnostic and trouble-shooting activities, which may, for example, require viewing the address
headers of e-mail messages to determine the cause of problems; keystroke monitoring of sessions to
determine inappropriate use of the computing facilities; searches in connection with a litigation,
threatened litigation, governmental proceeding or investigation; investigation of a possible data breach;
investigation of possible breach of University policy, rules, handbooks, or protocols; and other measures
to safeguard the University’s systems and compliance with laws. These examples are not intended to limit
the University’s right to access a user’s electronic files under circumstances deemed appropriate by the
University. In such situation(s), University computer resources in the possession of a user, or otherwise
assigned to an individual, may be accessed, reviewed, duplicated, stored, and forwarded by appropriate
personnel without the user's permission or knowledge.
Without limitation, because employees are granted access to and use of FDU computing resources to
conduct University business, the University reserves the right to access electronic mail messages left on
or transmitted through the University's computing resources. Employees should not assume that such
messages are private and confidential or that the University or its designated representatives will not
have a need to access and review this information.
The Family Education Rights and Privacy Act (FERPA) binds all users who have access to student data
and this policy is subject to FERPA requirements. In general, FERPA gives students more control over
their educational records, and it prohibits educational institutions from disclosing “personally identifiable
information in education records” without the written consent of the student (subject to specified
exceptions). To find out specifically what information you may or may not give out and to whom,
contact the office of the Vice President for Student Affairs.
POLICY VIOLATIONS
Policy violations should be reported immediately to any one of the individuals listed in Appendix 1.
Violations of this policy will be addressed as described in the Student, Faculty and/or Employee
Handbooks, any relevant contracts, and, if applicable, State and Federal law or regulations. University
students and employees who violate this Policy will be met with appropriate disciplinary action, up to and
including dismissal, expulsion, or termination from the University. Third parties who violate this Policy may
have their relationship with the University terminated and their access to campus restricted. In addition, a
user's system privileges can be suspended for a specified time period or revoked and/or a monetary fine
may be imposed on those in violation to reimburse the University for the staff time and other costs of
investigating and rectifying the violation.