University Of Central Missouri: Case Study

Improved Essays
University of Central Missouri seems to be addressing EPCA through multiple policies that act as a guidelines towards how student email is subject to being intercepted and read by the university.
First, as per the university's email regulation guidelines defines what is considered to be an appropriate use. Under this guideline the university outlines that emails are to be used in an appropriate manner, and if an inappropriate conduct is found the use of the email may be taken away. It further defines what constitutes as an inappropriate use of the email system.
In addition it also outlines that emails are not to be deemed private communication as they are subject to interception without any prior approval from the student. If the content of the email is deemed to be inappropriate severe action may be taken by the university.
…show more content…
Such announcement have to be related to university business and activities.
The email regulation policy does outline very clearly that emails are subjected to monitoring and interception by the university. It also lays out the nature of the announcement that are permissible under the policy. However this policy fails to specify detailed next steps that university may take when a student or university employee is found guilty of violating the email regulations. The policy should reference another policy that outlines the actions university can take against the guilty

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    1) Network traffic analysis shows that a single host is opening hundreds of SSH sessions to a single host every minute. a. The large number of attempted connections each minute suggests this is an attempted denial of service attack. This type of attack attempts to overload network resources with illegitimate traffic to deny service to legitimate users or business needs. IDS and IPS devices can detect all of this traffic, and the IPS can drop (or have border network devices such as firewalls drop) these packets to prevent the attack from succeeding.…

    • 1074 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    In the beginning of the semester I was unfamiliar with the many numbers of business report there are, and how important it is to properly prepare your documents. However, upon the final days of class I am proud to share how much I have learned. I now have the confidence to excel in my writing. Our textbook “Writing That Works”, became such a larger impact on my success in this class.…

    • 1308 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Will Doolittle was a financial analyst at the corporate headquarters of Home Décor in Atlanta, Georgia. He was terminated for violating provision of the employee handbook. His violation included sending email to friends of a sexual nature and the use of Internet to play slot machine and other games. Doolittle believes his employer violated his right by monitoring his personal email and Internet use. Employer authority to check email and Internet use has grown in the present time.…

    • 1444 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Azman's Article Analysis

    • 215 Words
    • 1 Pages

    As published in the ABA Journal (2016) Azman, a lawyer that was fired from the law firm where he used to work, used computer access codes and logins to delete e-mails from Piscitelli’s computer (his former boss) as well as peers. According to the article the employee who had been fired attempted to black mail his former boss by telling him that would steal his clients, criticize and disparage his performance and reputation. When Piscitelli warned the former employee (Azman) that he would take legal actions if he acted upon his treats, Azman used credentials he had gained access from work to delete e-mail communication about his threats to his boss Piscitelli. Information security is a major issue not only for personal computer users…

    • 215 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Rawlinson Road Case Study

    • 1325 Words
    • 6 Pages

    I. School Type: Rawlinson Road Middle School II. Faculty/Staff and Student Acceptable Use Policy A. General Information 1. At Rawlinson Road Middle School, technology use is a not a right, but rather a privilege. As such, administrators, staff, parents, and students must be appropriately trained in regards to technology use at Rawlinson Road. 2. Anyone who utilizes the technology resources available at Rawlinson Road must be aware of and comply with ALL of the requirements listed in Section B below.…

    • 1325 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Every organization needs a set structure of ongoing monitoring and auditing policies in order to insure compliance with the many laws, standards, and regulations. Our scholastic institution is one such organization. Due to the enormity of violence against children while on the Internet, this institution must remain compliant with all aspects of the below laws. Below is information on FERPA, SOX, CIPA and COPPA that should be maintained with compliance. FERPA, Family Education Rights and Privacy Act, is a law protects the privacy of student education records.…

    • 753 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    This letter is to inform you that plagiarism has been detected in your Engl 221 class paper. In a search of the text of your paper, it was found that information was taken from a FAA research report without attributing the source. According to Embry Riddle Aeronautical University policy, the following actions will take place: • You will fail the course but you may retake it in a future term • A copy of this letter will be placed in your student file • You will be placed on academic probation Please note that if any future violations of academic integrity should occur, more severe disciplinary actions may take place such as expulsion.…

    • 113 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    She attended school at Penn Valley and upon graduation she wanted to be an airline stewardess. Going through the training process Marva Parker realized it wasn’t for her and decided to quit. Her mother wasn’t having it and told her she needed to get a job. Filling out her application to work at the BFC was only to appease her mom for the time being - only to be hired the day after she dropped off her application with a start date the very next week.…

    • 440 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Metro High School System

    • 998 Words
    • 4 Pages

    In support of the Metro High school's mission of teaching, research, and public service, the Metro High school system provides computers, a network, and resources for the facility, students, faculty, and staff. Rights and Responsibilities While the school does provide some computers there may not be enough for all students/employees and therefore students/employees are encouraged to bring their own computers or tablets. The networks can provide access to resources both inside and outside within the area of school grounds. The network will have the ability to communicate with other users outside of the schools network. Such access is a privilege, and requires that users act accordingly.…

    • 998 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The Fourth Amendment is comprehensive and highly valued by American citizens and reflects the framers belief that the government should not be allowed to interfere in some aspects of a citizen’s life. The Fourth Amendment clearly protects a person’s home and personal property, but their electronic communications are less defined and protected under current law. When the Constitution was written, paper records were all that existed and these were protected; electronic records should qualify equally and be considered the same as “papers and effects.”…

    • 130 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Personal data is important no matter who you are. The chance of hackers accessing your information and handing it out to whomever they please to is a scary and real thing. Watching what athletes participate in on their free time is absurd. The collages signing contracts with companies to do so, are no longer protecting their students. There is not, and never will be, a way for electronic data, as they are using, to be one hundred percent safe from falling into the wrong hands.…

    • 509 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Acceptable Use Policy

    • 552 Words
    • 3 Pages

    Acceptable Use Policy: This policy outlines the acceptable use of TIJONCORE computer equipment. This policy also applies to the use of TIJONCORE information and electronic equipment owned by TIJONCORE, and network resources that are used to handle TIJONCORE business. Internet, Intranet, software, operating systems, network accounts, and email accounts are the property of TIJONCORE. These systems are not to be used for personal affairs, but for business purposes only.…

    • 552 Words
    • 3 Pages
    Great Essays
  • Great Essays

    Why a Written Communication Policy? Communication is essential for any organization to be successful, especially in education (National School Public Relations Association, 2006). The flow of communication between the school superintendent, local school board, teachers, students, parents and community, must be transparent with written policies in place that are accessible (National School Public Relations Association, 2006). A school communications policy should be carefully written with direction on the purposes, plans and objectives how the school will communicate with each of the stakeholders (Moore, 2012).…

    • 1740 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Doing Honest Work in College Reflection Paper Charles Lipson breaks down the three principles of academic honesty as how to demonstrate work done by yourself, how to correctly cite, and how to present truthful data (Lipton 3). The book discusses how to demonstrate these principles and how to avoid situations where academic honestly is questioned. These principles will mold a person to be an honest student and an honest person when preforming any work in or out of school. The three principles of academic honesty in this book applies in my situation because I shouldn’t have placed my professor or myself where they had to question my academic honestly in an exam situation.…

    • 738 Words
    • 3 Pages
    Improved Essays