Wheeling Jesuit University is pleased to offer fast, reliable, efficient e-mail systems to all members of the University community for the purpose of carrying out instruction, research, and administrative communications. All electronic communication systems and all communications and information transmitted by, received from, or stored in these systems are the property of Wheeling Jesuit University. These resources contribute to the work of all individuals on campus and must, therefore, be used with great care.
The campus e-mail systems are primarily for University business and academic use. In that spirit, any inappropriate, or illegal use of the system may be considered an offense that could lead to disciplinary action or termination.
Users of campus e-mail are required to abide by the following guidelines:
Please refer to the Acceptable Use Policies for Information Technology Resources at Wheeling Jesuit University for further information.
1. Global mailings to multiple recipients should refer to WJU related activities only. Originating or forwarding unsolicited junk e-mail, "for-profit" messages, chain letters, jokes, virus hoaxes, or non-WJU sponsored advertisements are not permitted. All virus warnings received should be forwarded to the appropriate computer support department.
2. WJU e-mail systems may be used for brief personal messages. Users should have no expectation of privacy in connection with the use of WJU e-mail systems and do so at their own risk.
3. E-mail accounts are given for the specific use of the individual to whom they are assigned. Users have the responsibility to safeguard their accounts with a confidential password known only to themselves.
4. Misuse of e-mail may also include, but is not limited to the following:
a. Sending fraudulent, harassing, annoying, disparaging, vulgar, or obscene messages.
b. Breaking into another user's e-mail account or reading someone else's e-mail without permission.
c. Forwarding potentially offensive messages that originated outside the campus to employees/students inside the campus.
d. Intentionally obscuring or forging of the date, time, physical source, logical source, or other header information of an e-mail message.
e. Harassing or threatening other users or interfering with their access to the University's computing facilities.
f. Use of an e-mail account to participate in a non-academic or non-work related mailing list.