Revised Proposed Policy on Privacy in the Electronic Environment
(Revised February 4, 2000. See "Almanac Between Issues")
I. Preliminary Observations
The University affirms that the mutual trust and freedom of thought and expression essential to the academic mission of a university rest on an expectation of privacy, and that the privacy of those who work, study, teach, and conduct research in a university setting will be respected. The University recognizes that as faculty, staff and students create, use and store more information in electronic form, there is growing concern that information the user or creator considers private may be more vulnerable to invasion than information stored in more traditional media. This policy is intended to highlight some general principles that should help to define the expectations of privacy of those in the University community. While no document addressing the fluid issue of technology can be exhaustive or inflexibly dictate outcomes in all circumstances, this policy attempts to articulate current practices and provide guidance, so that individuals may make informed and appropriate decisions concerning their various interactions in the electronic environment.
Before addressing these issues, it should also be noted that in carrying out their operations, various departments of the University accumulate information about members of its community, e.g., for purposes of payroll, employment or enrollment. Data are also created, though not necessarily compiled or retained on a personally identifiable basis, as an incident to the use of technology, e.g., the charging of purchases on PENNCard or the borrowing of library books. The University does not condone disclosure or release of such personal information stored or transmitted through University systems, except for legitimate University purposes as outlined in this policy.
Those responsible for maintaining the University's computers and electronic networks have an important and special responsibility to recognize when they may be dealing with sensitive or private information. They may access such information without obtaining higher level approval, but only when necessary to fulfill their official responsibilities, and they are expected to carry out their duties in ways that are not unreasonably intrusive. They will be subject to disciplinary action if they misuse their access to personally identifiable data or to individuals' personal files, e-mail and voice mail or otherwise knowingly act in ways counter to University policies and applicable laws.
Finally, this policy should be understood in light of the many other University policies and laws that bear on individuals' rights to privacy and the institution's responsibilities with respect to information in its possession about individuals. Examples of applicable laws include the Family Educational Rights and Privacy Act of 1974 (the "Buckley Amendment"), the Electronic Communications Privacy Act of 1986, and medical records regulations promulgated under the Health Insurance Portability and Accountability Act of 1996. Examples of applicable University policies include the Acceptable Use Policy for the Electronic Environment, Administrative Computing Security Policy, Policy for Closed Circuit Television Monitoring and Recording of Public Areas for Safety and Security Purposes and policies on Records Confidentiality and Safeguarding University Assets.
II. Policy on Information Created, Stored or Transmitted Through University Electronic Media
The University provides computers, computer and e-mail accounts, networks and telephone systems to faculty members, staff and students for the purpose of furthering the University's academic mission and conducting University business. While incidental and occasional personal use of such systems, including e-mail and voice mail, is permissible, personal communications and files transmitted over or stored on University systems are not treated differently from business communications; there can be no guarantee that such personal communications will remain private or confidential (see Appendix).
As is the case for information in non-electronic form stored in University facilities, the University's need for information will be met in most situations by simply asking the author or custodian for it. When questions arise about access, review or release of information, the University commits to treat electronic information no differently from non-electronic information. However, the University reserves the right, in cases when it is appropriate, to access, review and release electronic information that is transmitted over or stored on University systems.
For example, properly authorized University officials including the Office of Audit and Compliance and the Information Security Officer may access e-mail, voice mail or computer accounts in cases of alleged research misconduct, plagiarism, harassment, violations of law or University policies, when necessary to maintain the integrity of University computing systems or to comply with judicial or regulatory mandates.
The University has the utmost respect for the freedom of thought and expression that are at the core of Penn's academic mission. Whenever possible, therefore, the University will resolve any doubts about the need to access a University computer or other systems in favor of a faculty member's privacy interest. There are situations, however, in which the University or others legitimately may require access to information that is created, stored, transmitted or received by members of the faculty through the University's facilities. In such cases, computer files, e-mail and voice mail created, stored, transmitted or received by faculty will be afforded the same level of privacy as the contents of their offices. The Policy on Safeguarding University Assets governs access to faculty records in connection with investigations carried out by the University's Office of Audit and Compliance, and provides for prior consultation with the Provost and Faculty Senate and for notifying the subject of a search of any files or materials taken during an investigation. Except as may otherwise be dictated by legal requirements, the procedures outlined in that policy will be followed with respect to a faculty member's computer files, e-mail or voice mail in connection with other investigations or proceedings.
It is generally not University policy to access staff members' electronically stored information. As noted above, the University's need for information will normally be met by asking an employee for it. Properly authorized University officials, including supervisors acting with the consent of their management, may, however, access, review and release the contents of staff computer files, e-mail or voice mail transmitted over or stored on University systems when, for example, an employee is absent or has left the University and the information is not available elsewhere, or in other situations in which it is necessary if the ordinary business of the University is to proceed. In more complicated situations--where, for example, a supervisor believes University resources are being misused--he or she should consult with senior administrators, the Division of Human Resources, or the Office of General Counsel concerning the Policy on Safeguarding University Assets.
Students are provided e-mail and computer accounts for use primarily in connection with their academic activities. While the University does not generally monitor or access the contents of a student's e-mail or computer accounts, it reserves the right to do so. However, access to and disclosure of a student's e-mail messages and the contents of his or her computer accounts may only be authorized by the Dean of the student's School or his/her designate, the Office of Student Conduct, the Office of General Counsel, or the Office of Audit and Compliance, upon a good faith belief that such action serves a legitimate University purpose. Ordinarily, a student will be notified of access to, or disclosure of the contents of his or her account .
Some individuals have multiple University affiliations (e.g. students employed by the University). When the need for access to information arises from a particular status, the provisions above for that status will be applied. In other cases, the provisions for the individual's primary status will be applied.
III. Violations of this Policy
Members of the University community who believe that this policy has been violated with respect to their privacy should attempt initially to resolve the issue within their unit or department, if necessary with the mediation of the leadership of their representative assembly or the University Ombudsman. Others who become aware of violations of this policy should report them to the University Information Security Officer, Office of General Counsel, Division of Human Resources or the Office of Audit and Compliance. Those who violate this policy may be subject to disciplinary procedures up to and including dismissal.
Almanac, Vol. 46, No. 20, February 8, 2000