Audience:All members of the Northwestern Community and users of the University network.
Definition:Clarification of the privacy that users can expect within the Northwestern network.
Computer, System, or Network Use
All users of the University's computing and network resources must be aware that privacy of electronic communication and/or stored data files may be routinely compromised by:
- inadvertent capture of transmission contents during network performance monitoring or troubleshooting,
- uncovering of transmission contents in computer memory within the store-and-forward systems that move data through the network,
- other maintenance activities that trap, copy, archive, or otherwise unintentionally preserve portions of messages within the University networks.
If the University inadvertently discovers messages or data files within its network that leads it to suspect the presence of illegal activities or activities that violate University policies, then the University will be free to use that discovered information to pursue investigations or to inform the appropriate authorities.
Computer, System, or Network Administration
The University reserves the right to take whatever steps are necessary to investigate possible network security threats, to investigate suspected violations of University regulations, or to assist appropriate authorities to investigate suspected illegal activities. On rare occasions, and with the approval of the vice president & chief information officer, the associate vice president for cyber infrastructure, or a director of an IT division, files belonging to individuals and/or communications between individuals may be captured, logged, and examined.
Reference ISO 27002 10.6.1
Last Review Date:
Original Issue Date:December 2002
Last Updated: 24 October 2014