In a previous post, I discussed recent high-profile cases involving college surveillance and the use of email or Internet postings against students, faculty or staff. (Update: The Electronic Frontier Foundation effectively won its case defending the student leader who emailed her criticisms of Michigan State's calendar policy to faculty on campus. The university accused her of "spamming." FIRE referred the litigation to EFF, a civil liberties group specializing in electronic law).
In Part II, I offer the following information to shock you into how little privacy you have via e-mail or the Internet. In short, if you use a university email account--even off campus--the university owns that electronic "property" and may archive it for years.
Most universities have network policies that forbid anything even remotely personal via email or the Internet on campus. Of course, everybody breaks this rule because a) they are not trained to understand the limitations on email; and b) most people believe that "emailing home" about getting dinner for the family is much like calling the family on a university phone. We all do it and yet that too violates university policy. A few campuses allow reasonable private use of university email but my university, like most others, does not carve out that space for students or staff. (Correction: The main Carbondale campus does not allow personal use but the Edwardsville campus does allow "personal use").
The following guide by Tina Murch, "E-mail Privacy? Only a 'Virtual Reality'" is the best wake-up call that I have read on the Internet. I highly recommend it to any one who uses university email or equipment. If you use your own laptop, Murch notes, you are still using university wireless and can be busted. Moreover, if you email from a non .edu account to someone with a non .edu account but that recipient receives it on campus, you are still busted! University discretion is enormous. Since most people are unaware of the pitfalls of email and computer use, even when off campus, Murch offers tips on how to survive this Brave New World.
Her tips are not enough. I urge you to contact university officials and request several things:
1. Training and transparency: The rules on most campuses sound good but there is discretion to do just about anything, particularly when information is archived (my university states that privacy is a "basic right" but there are loopholes, including the unstated "gotcha" category of punishing people for private use of email. Also the catch-all "disclosure made for the purpose of resolving internal disputes," etc.)
2. Question authority: ask questions of campus authorities:
*How many monitoring cases have there been in the past five years?
*How long does your university archive email and other Internet usage logs?
*Campus newspapers need to ask whether their email correspondence is subject to surveillance. In one case, a university fired faculty, in part, because of "private" email sent to a student newspaper editor. Accused of trying to "discredit" an administrator, the campus president fired two faculty members!
For more on that case, read here. Apparently, bringing truthful information to the president, following procedure, and then having the local AAUP investigate when the president did nothing about a serious matter = termination of two tenured faculty. This case, and so many others, is why I have lost my capacity to be shocked but not to be outraged.
So, if you think it can't happen on your campus, it has and will if good people do nothing. Even on my own campus, high-profile termination cases left a lot of questions about the use of past email. But the investigation reports are sealed and heavily redacted, or so we are told. Who knows how far back universities go when retrieving email in cases against students or faculty.
Student email has been punished at my university because it "harassed" the recipient, who was so shattered she published it on her web magazine! Although the email was in poor taste, taking out an ad to decry anti-feminist ramblings sounded like overkill to our campus newspaper. One wonders when a college president will take similar action against some wild-eyed feminist bashing Republican women as "fascist sex-traitors." My guess is: never.
3. Statute of Limitations: Since most people are clueless, and have violated strict network policies, almost any one can have their electronic past used against them. Officials need to set a statute of limitations for violations, as they do in other university code violations. Currently, university network policies set "forever" as the default statute of limitation. That makes the IRS sound like a friendly agency by contrast!
4. Reasonable private use: Some universities take the "chill" off students and staff by allowing reasonable private use. The alternative is for people to avoid .edu email altogether--and that is not good for the university! God knows, this professor has to look up the preferred email of students on Facebook because I assume that .edu is not their primary address. This is an unproductive use of my time.
5. Offense is defense: if you are a free thinker--and who doesn't think freely from time to time?--and feel you may become a target, make a habit of archiving all of your email for contextual defense. Campus prosecutors routinely "cherry pick" email to cast the accused in the worst light. Don't let them do it.
If you become involved in controversies (or not), you may wish to retain certain information in case Big Brother tries to terminate you. Keep this information and your email archive in a safe place, preferably in an encrypted online storage site. (My home was burglarized but I had a backup AND certain information I may need in the future is in a place where burglars cannot get it).
Remember the line: "do not go gentle into that good night!" (Dylan Thomas)
Again, just to let you know what universities can do to you, check out the cases in my prior post and this explicit statement by Temple University in its email usage guide: Scroll down to 14.6 to read this:
"14.6 WORKPLACE SURVEILLANCE AND SEARCHES
Temple University may authorize the use of reasonable surveillance and search measures as necessary to ensure an appropriate work environment or compliance with University policies and applicable law. Subject to legal requirements, the University reserves the right to inspect and search all work areas, desks, computers, file cabinets, lockers, lunch boxes, or other containers, and personal vehicles in University parking lots or public streets within campus boundaries or any other area within University control. In addition, all records contained in computers (including voice mail and e-mail) and storage devices (including removable media) are open to inspection by the University in accordance with University policies, subject to applicable legal requirements."
Got your attention?
Part III (forthcoming) will be a guide to protecting your privacy when you are completely free of campus life. Even at home, you may be vulnerable to keylogging and other privacy-invading practices. Yes, even if you use a Mac!
Trash Can Recycling
1 day ago