ELECTRONIC COMMUNICATIONS POLICY SCOPE: This policy applies to all Users of Hospital electronic mail (e-mail), electronic communication systems and information systems, including, but not limited to, employees, contractors, physicians, service centers and representatives of vendors and business partners. Unless otherwise indicated, this policy applies to both internal Hospital e-mail and e-mail sent over the Internet. The policy applies to all of the Hospital’s e-mail systems and other information systems and methods, including, but not limited to: All e-mail systems (Outlook, Meditech Magic Office (also known as MOX), etc.); All information systems and associated infrastructure; All automated electronic communication processes utilizing e-mail or the Internet; Internet-based discussion groups, chat services, and mailing lists; Electronic connections with the Internet or non-Hospital Systems; and Electronic bulletin board systems and online services to which the Hospital subscribes. PURPOSE: This policy is designed to protect the Hospital, its personnel, its customers, and its resources from the risks associated with use of e-mail, the Internet, and other forms of electronic communication. POLICY: A. Business Purpose and Use. The Hospital encourages the use of the Internet, e-mail, and other electronic communications to promote efficient and effective communication in the course of conducting Hospital business. Internet access, e-mail and other electronic communications are Hospital property, and their primary purpose is to facilitate Hospital business. 1. Users have the responsibility to use electronic communications in a professional, ethical, and lawful manner in accordance with the Hospital’s Code of Conduct. 2. Every User has a responsibility to maintain and enhance the Hospital’s public image and to use Hospital e-mail, access to the Internet, and other electronic communications in a productive manner. These electronic communication mechanisms may be subject to discovery in the event of litigation. As with all communications, colleagues should avoid saying or using anything that might appear inappropriate or might be misconstrued by a reader. 3. The Hospital recognizes that Users may occasionally need to conduct personal business during their work hours and permits highly-limited, reasonable personal use of the Hospital’s communication systems. Any personal use of the Hospital’s electronic communications is subject to all the provisions of this and related policies. Any questions are to be directed to the User’s Hospital supervisor/representative. B. Hospital Right to Access Files and Messages. 1. Users shall presume no expectation of privacy in anything he/she may create, store, send or receive on the computer systems and the Hospital reserves the right to monitor and/or access communications usage and content without the User’s consent. The Hospital may log, review, and otherwise utilize information stored on or passing through its systems in order to manage systems and enforce security. For these same purposes, the Hospital may also capture User activity such as telephone numbers dialed and web sites visited. 2. Users will return all electronic files or determine appropriate disposition with their immediate supervisor when leaving the department or separating from the Hospital. The User will not delete files and will retain files in accordance with the Hospital Records Management Policy ____. 3. To ensure appropriate use and successful operation of the Hospital’s electronic communication systems and the information they contain, it is sometimes necessary for Hospital system administrators to access and view their contents. Statistical information about each User and other measures of system performance, such as number and size of messages sent and received, Internet sites visited, length of time spent using the Internet, etc., are routinely collected and monitored by system administrators. While the goal of this type of monitoring is to evaluate and improve system performance, any evidence of violations of Hospital policy discovered in the course of this type of monitoring will be reported to the appropriate managers. 4. The Hospital reserves the right to examine electronic mail, personal file directories, hard disk drive files, and other information stored on Hospital information systems at any time and without prior notice. a. b. c. 5. This examination is performed to assure compliance with internal policies, support the performance of internal investigations, and assist with the management of Hospital information systems. Only the Hospital legal counsel Compliance Officer in consultation with Hospital Administration Counsel can authorize access to and disclosure of an individual colleague’s messages or computer files without that colleague’s knowledge, except as noted in 5 below. Information contained in e-mail messages and other information concerning computer usage may be disclosed to the appropriate authorities, both inside and outside of the Hospital, to document employee misconduct or criminal activity. Moreover, in some situations, the Hospital may be required to publicly disclose e-mail messages, even those marked private or intended only for limited internal distribution. Personal files on Hospital computers must generally be handled with the same privacy given to personal mail and personal phone calls. This means that other workers, including managers and system administrators, must not read such personal files without authorization as described above. The following exceptions may be made routinely upon a request to the Hospital’s Director of Information Systems with approval of the User’s department manager: a. b. C. To dispose of or reassign files after a User has left the Hospital, or To access critical files when a User is absent and has failed to properly delegate access to e-mail or forward such files to appropriate colleagues. Communications Content. Users will use the same care in writing and distributing e-mail or other electronic communications as they would for any other written communication. Content of electronic communications should be truthful and accurate, sent to recipients based on a need-to-know and sent/posted with appropriate security measures applied. 1. Sensitive Hospital information, patient identifiable information, or confidential information as defined in the Hospital’s Code of Conduct, may only be transmitted to individuals via the Hospital’s internal e-mail systems (e.g., MOX, Outlook) to other Users of the Hospital e-mail systems who are authorized to access the specific information; 2. Sensitive Hospital information, patient identifiable information, or confidential information as defined in the Hospital’s Code of Conduct, may only be transmitted to accounts or destinations outside the Hospital using secure methods specifically approved in advance by Information Services (IS) and in accordance with the Hospital’s Appropriate Access policies. In addition, appropriate agreements must be in place between the involved parties. 3. Sensitive Hospital information, patient identifiable information, or confidential information as defined in the Hospital’s Code of Conduct, must not be posted on publicly-accessible areas of the Internet (e.g., discussion groups, bulletin boards, chat services, unsecured web sites, etc.). Examples of inappropriate transmissions: a. Sending sensitive Hospital information in an e-mail or as an attachment to an e-mail to your home e-mail account. b. Using standard unencrypted or otherwise unsecure e-mail for communications with patients and other healthcare consumers. D. Sanctions. Violations of this policy could lead to disciplinary measures up to and including termination of employment or business relationship. Suspected violations of this policy are to be handled in accordance with the Hospital’s disciplinary policies. PRODCEDURES: A. Communications Uses: In the use of electronic communication mechanisms, Users must maintain these procedures in carrying out the appropriate use of electronic communications. 1. Computer Viruses. Every User must take reasonable precautions to avoid introducing viruses into the Hospital’s network. Files from the Internet should not be downloaded unless approved by your supervisor and as needed to perform User’s job function, or e-mail attachments from outsiders opened, without first scanning the material with IS-approved virus checking software. For example, users should not download screen savers. a. All Users must have the Hospital’s standard anti-virus utility properly installed and running on their PCs; b. All Users must keep virus signature files updated pursuant to IS Standards; and c. All Users must be aware that when they receive an e-mail from an unknown source with an attachment they should be skeptical about the message and they must delete the message/attachment without opening the message and/or attachment. 2. Internet/Network Connections. a. Accessing the Internet or other Non-Hospital network directly, by modem or alternate provider, while connected to the Hospital network is strictly prohibited. For Example: A User must not dial-out to unauthorized Internet Service Provider (ISP) or services (e.g., American Online (AOL)) due to the lack of boundary protection with adhoc connections. b. Users accessing the Internet or other Non-Hospital network through a computer attached to the Hospital’s network may do so only through approved connections and methods (e.g., firewall/proxy or virus wall) to establish boundary protection. A contract/agreement must be established prior to the establishment of network connections and communication and/or the exchange of electronic information assets. The involved parties will agree to exchange and provide for the confidentiality and integrity of the exchanged electronic information assets. For Example: Business Associates will be connected through an approved vendor firewall method when an agreement is established. c. Users will use only Hospital e-mail services on Hospital equipment and network. Users must not access Non-Hospital e-mail services. These e-mail services may introduce viruses to the Hospital network when a User checks his or her e-mail. For Example: Users must not access e-mail services such as Hotmail, Yahoo, Lotus Notes, etc. 3. Remote Access Authentication. Users will be “strongly” authenticated into the Hospital’s network when accessing the network from off-premise locations. Strong authentication requires the use of something more than a network user-ID and password such as a token or certificate PIN number as defined in the IS Security Standards. Due to the nature of changing technologies, the method to strongly authenticate an individual, process or program will be defined in the IS Security Standards. 4. Internet Use. The Hospital is not responsible for material viewed or received by Users on or from the Internet. Users are only to access or download materials from appropriate Internet sites in accordance with the Code of Conduct. 5. Records Management. Messages and documents transmitted electronically may be considered official business records of the Hospital and are therefore subject to the Hospital’s Records Management Policy ______. The originator/sender of the message or other electronic transmission (or the recipient if the sender is outside the Hospital) is the person responsible for retaining the message or transmitted information. E-mail messages may be retained in electronic form in the mailbox, or printed and filed along with other documents related to the same topic or project. Users may delete messages pursuant to the Records Management Policy _____, or that are being retained in printed form. 6. Size Requirements. The Hospital’s e-mail and Internet access systems do not have unlimited transmission or storage capacity. For this reason, IS will establish limits on message size, mailbox size, and volume of messages. Some of these limits are configured in the system, while others depend on judicious use of e-mail features. a. b. B. Users are to use file compression utilities on large files to reduce the size of attachments before sending a message in an e-mail attachment. For example, files greater than two (2) megabytes should be compressed. Users are not to include clipart or other graphics in the autosignature feature. Users are to avoid using message background designs because they increase the size of an e-mail message. Unacceptable Uses. The Hospital’s Internet access, e-mail, or other electronic communications may NEVER be used in any of the following ways: a. To harass, intimidate, or threaten another person. b. c. d. e. f. g. h. i. j. k. l. m. n. o. p. C. To access or distribute obscene, sexually explicit, abusive, libelous, or defamatory material. To distribute copyrighted materials that are not authorized for reproduction/ distribution. To impersonate another user or mislead a recipient about your identity. To access another person’s e-mail, if you are not specifically authorized to do so. To bypass system security mechanisms. To transmit unsecured patient identifiable or other sensitive Hospital information. To initiate or forward chain letters or chain e-mail. To send unsolicited mass e-mail (“spamming”) to persons with whom the User does not have a prior relationship. To participate in political or religious debate. To automatically forward messages (e.g., with mailbox rules) to Internet e-mail addresses. To communicate the Hospital’s official position on any matter, unless specifically authorized to make such statements on behalf of the Hospital. To pursue business interests that are unrelated to the Hospital. To conduct any type of personal solicitation. To deliberately perform acts that waste computer resources or unfairly monopolizes resources. For any purpose, which is illegal, against Hospital policy, or contrary to the Hospital’s best interests. Policy Exceptions The IS Security key contact will establish a security governance process at the corporate level to review and approve policy exceptions. Exception approval will be based upon risk management reflecting appropriate, reasonable and effective security measures for a given situation.