View Document

IT Appropriate Use - Email Guidelines

This is the current version of this document. To view historic versions, click the link in the document's navigation bar.

Section 1 - Purpose / Objectives

(1) Email is used at Victoria University as a business communication tool and users are obliged to use this tool in a responsible, professional, effective and lawful manner. The University considers email an important means of communication and recognises the importance of proper email content.

(2) The purpose of these Guidelines are to provide advice on the proper use of the University's email system and to inform users of the University's required standard for email use.

Top of Page

Section 2 - Scope / Application

(3) These Guidelines applies to:

  1. VU staff, students and other users with a University email account.
  2. Sending or forwarding emails from the University email system.
Top of Page

Section 3 - Definitions

(4) Nil

Top of Page

Section 4 - Policy Statement

(5) Nil

Top of Page

Section 5 - Procedures

(6) Nil

Top of Page

Section 6 - Guidelines

Legal Requirements

(7) The following actions are forbidden by law when sending or forwarding emails:

  1. Using material which constitutes an infringement of copyright. Refer to the University's ' Copyright Policy in determining what third party material can be used.
  2. Defaming an individual, organisation, association, company or business.
  3. Communications that are obscene, offensive or involve the use of illegal material, including the use or transfer of material of a sexual nature.
  4. Breaching a university policy, procedure, statute or regulation.
  5. Directly or indirectly interfering with or conflicting with lawful University business.
  6. Intentionally bringing the University or its officers into disrepute.
  7. Sending unsolicited and unauthorised global or commercial email messages.
  8. Forging or attempting to forge email messages.

(8) If you send or forward an attachment that contains a virus, you and the University can be held liable.

(9) Staff members who send or forward such emails may be subject to disciplinary action which may include termination of employment. Students who send or forward such emails may be subject to disciplinary action in accordance with Student Misconduct Regulations 2014.

(10) Any emails received of this nature should be forwarded via email for reporting and investigatory purposes to the ITS Service Desk at servicedesk@vu.edu.au . Emails will be logged by ITS Service Desk and assigned to the ITS Security Office for investigation. Each case will be assessed and proper action will be taken based on the severity of the breach..

(11) Staff and students at VU undertaking research may send emails containing such materials provided that it demonstrably refers to their area of research and is done so in a responsible manner and in accordance with any legislative requirements.

(12) The use of the "on the behalf of" option is permitted to be used by Victoria University, with the approval of the email account holder.

(13) Emails can be sent on behalf of another user as long as the user has given the appropriate permissions.

Personal Use

(14) Although the University's staff email system is meant for business use, the University allows the reasonable use of email for personal use under the following conditions:

  1. Personal use of email should not interfere with work.
  2. Personal emails must adhere to the IT Appropriate Use Policy and associated procedures.
  3. Users are discouraged to forward nuisance emails such as chain letters, junk mail, jokes and frivolous attachments.
  4. Must not be used to run a private business whether for profit or not for-profit.

(15) Avoid forwarding University emails to your personal email accounts. Access to University email via remote access or email web application should be used to access work related emails from home.

Spam

(16) The sending of unauthorised and unsolicited global or commercial email transmissions (spam) is forbidden. Mass electronic communications should only be sent in accordance with the VU IT Appropriate Use - Internal Mailing Lists Procedure.

Sensitive and restricted information

(17) Avoid sending sensitive and restricted official information by e-mail. If you do, you should secure the information by including it in a Microsoft Word or Excel file and protecting it with a password, and then provide the recipient with the password by means of other communication, for instance by telephone.

(18) The University recommends any information users consider sensitive or vulnerable be encrypted, especially for transmission to external organisations.

Disclaimer

(19) A disclaimer will be automatically attached to all outgoing emails sent from University email accounts. This disclaimer must not be altered or interfered with in any way.

System Monitoring

(20) Your emails may be monitored for the operational integrity of the Victoria University Infrastructure and/or to comply with legal or regulatory requirements. See the IT Security Policy.

(21) Victoria University has the right to access and conduct audits on emails sent and received from University email accounts as well as email records retained in University archive systems as part of the IT Security Policy and IT Security - IT Security Audit Authorities Procedure.

(22) If there is evidence that a student or staff member is not adhering to these Guidelines, the University reserves the right to take disciplinary action, including termination and/or legal action.

Retention of Emails

(23) Email records from University email accounts that have been moved to the central archive will be retained for a set period as defined in the IT Appropriate Use Policy.

(24) Any exemptions to the email retention period must be approved by the Executive Director, IT Services and supported by a business justification from a Dean or Head of Department.

Security and Passwords

(25) All Email accounts maintained on the University's email systems are property of the University.

(26) Passwords must not be disclosed to other people unless it is necessary for approved operations of the University.

(27) The University will NEVER ask you to provide your email username and password by email. If you receive a message asking you to respond with details of your username and password, it is a forgery.

(28) If you provide these details to third parties fraudulently masquerading as University officials, you will be responsible for all actions carried out using your account by those third parties.

Styling

(29) Emails sent from VU email accounts must not contain customised backgrounds. Backgrounds should remain as a default that is provided by the email applications.

Writing emails

(30) Best practice guidelines for writing emails:

  1. The title of the email should reflect the contents therein.
  2. Write well-structured emails and use short, descriptive subjects.
  3. The University's email style is informal. This means that sentences can be short and to the point. You can start your e-mail with 'Hi', or 'Dear', and the name of the person. Messages can be ended with 'Best Regards'.
  4. Signatures must include your name, position and faculty/department. A disclaimer will be added underneath your signature (see Disclaimer).
  5. Use the spell checker before you send out an email.
  6. Do not send unnecessary attachments. Send links and/or use shared drives.
  7. Do not write emails in capitals.
  8. If you forward emails, state clearly what action you expect the recipient to take.
  9. Only mark emails as important if they really are important.

Replying to emails

(31) Emails should ideally be answered within at least 8 working hours, but users should endeavour to answer priority emails within 4 hours.

Maintenance

(32) Delete any email messages that you do not need to have a copy of, and either set your email to automatically empty your 'deleted items' on closing or regularly empty your deleted items folder.

Request for access to email

(33) Requests for a new VU email account can be made through the IT Service Desk system.

Request for access to another mailbox

(34) Requests for access to another mailbox can be made through the IT Service Desk system.