1. The Johns Hopkins Enterprise Messaging Service ("JHEM"), as operated by the Johns Hopkins Institutions ("JHI"), is a computer, interactive information, e-mail and calendaring service allowing access to the Internet, bulletin boards, private networks and other communications outlets. JHEM is available only to those users found in the Johns Hopkins Enterprise Directory (JHED) and is accessible via an authorized personal computer or workstation having a communications connection (e.g. Local Area Network (LAN) connection, modem, ISDN, DSL or cable modem).
2. CAREFULLY READ the terms of this agreement, which governs your use of the JHEM system. JHI may modify this agreement at any time and in any manner. Your continued use of the JHEM system following any modification to this Agreement shall be conclusively deemed an acceptance of all such modification(s).
3. Violation of the terms of this agreement is grounds for disciplinary action, which could include but is not limited to verbal and written warnings, revocation of access privileges, termination of employment or student status, and criminal prosecution.
4. The JHEM system is for the private use of authorized users in the conduct of JHI business. You ("User") agree not to use the system for any other purpose.
5. User understands that an account authorizing access to the JHEM system is granted to an individual on an as-needed basis and that sharing of accounts and disclosure of passwords to unauthorized personnel is expressly forbidden. User acknowledges that he or she is solely responsible for all actions resulting from the use of his or her account.
Prohibited Uses and Behaviors
6. User expressly agrees not to use the JHEM system in a manner that is prohibited by any law, regulation, or JHI policy or to facilitate the violation of any law, regulation, or JHI policy. User further agrees not to use the JHEM system in a manner that will disrupt third parties' use or enjoyment of the JHEM system or other communications services and outlets. User acknowledges that prohibited conduct includes, but is not limited to: use of the JHEM system for any commercial purpose, use of the JHEM system to invade the privacy of third parties, posting via e-mail, USENET, or other medium abusive, profane, libelous, slanderous, threatening or otherwise harassing material, posting material in any USENET newsgroup that is off-topic according to the charter or other public statement of the USENET newsgroup, posting or propagation of chain letters, posting or propagation of "SPAM" or other unsolicited commercial material, and manipulation of routing information and/or message/packet headers for the purpose of obfuscating the packet or message origin.
7. User acknowledges that mass posting (the transmission of a single message to a large number recipients or USENET newsgroups, or the transmission of extremely large messages or multiple, substantially similar messages to any number of recipients, whether solicited, noncommercial, or otherwise) imposes a tremendous burden on the JHEM system because of its excessive use of disk space and network bandwidth. User agrees not to engage in such transmissions, unless prior approval is granted by either the JH University Office of Public Affairs or the JH Medicine Office of Public Affairs.
Security and Monitoring
8. Use of the JHEM system constitutes a consent to monitoring at all times. If monitoring of this or any other JHI computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about User, may be provided to law enforcement officials. If monitoring of this or any other JHI computer system reveals violations of security regulations or unauthorized use, this evidence and any other related information may be provided to appropriate JHI management officials.
9. User agrees not to violate, tamper with, or attempt to circumvent the security of the JHEM system, or to use the JHEM system to violate, tamper with, or attempt to circumvent the security of any system accessible through the JHEM system.
10. JHI reserves the right to restrict or deny access and service to any entity which, in the sole opinion of JHI, poses unnecessary risk or burden to JHI-Mail systems.
Protection of Information
11. User understands that information available through the JHEM system may be confidential or proprietary and expressly agrees to actively protect such information from unauthorized disclosure. User further understands that all information available through the JHEM system, whether confidential, proprietary, or otherwise, is disseminated only on a "need to know" basis and that the ability to access any piece of information, in and of itself, does not authorize access to that information.
12. Material accessible to User through the JHEM system may be copyrighted. Except as expressly permitted by the copyright holder of the material, User may not reproduce, redistribute, retransmit, publish or otherwise transfer, or commercially exploit, any material which they access or receive through the JHEM system.
Notification and Cooperation
13. User agrees to immediately notify JHEM management of any known, suspected, or potential unauthorized access to or use of any confidential or proprietary information, JHEM system, or third-party system accessed through the JHEM system.
14. User agrees to cooperate with JHEM management in the investigation of any known, suspected, or potential unauthorized access to or use of confidential or proprietary information, JHEM system, or third-party system accessed through the JHEM system.
System Resources and Capacity Management
15. User understands and agrees to the following storage limitations of the JHEM system. System resources such as disk space are associated with a cost and it is our desire to allocate the space so that it meets service levels and yet is cost effective. The user, therefore, agrees to maintain their personal JHEM account and associated disk space within the following quotas:
100 MB per account for Students
500 MB per account for Staff
1 GB per account for Faculty
25 MB maximum message size
16. JHEM users understand that accounts remaining completely inactive for 12 months or more will be deleted in order to allocate resources equitably and efficiently among active users.
E-mail Retention and Recovery
17. JHEM users should be aware that electronic mail is backed up on a routine or occasional basis to protect system reliability and integrity, and to prevent potential loss of data. The backup process includes the copying of data onto storage media that is retained for a specified period of time and in locations unknown to the originator or recipient of electronic mail. E-mail recovery may be granted upon a case by case basis, within thirty days of the current date.
Terms of Service, September 30, 1996; revised October 17, 1996; revised November 18, 1996; revised January 28, 1997; revised August 13, 1999; revised February 11, 2000; revised April 25, 2000;revised February 19, 2002; revised July 24, 2003; revised April 19, 2004; revised June 25, 2004; revised April 28, 2011