GP-006 – Email

Responsible Office: Office of Cybersecurity

Last Review: 06/30/2021

Next Review: 06/30/2023

Contact: Chris Madeksho

Phone: 901.448.1579



The University of Tennessee Health Science Center (UTHSC) email services support the educational and administrative activities of the University and serve as official communication by and between users and UTHSC. The purpose of this standard is to ensure that this critical service remains available and reliable and is used for purposes appropriate to the University’s mission. This standard is also designed to meet compliance requirements for data regulated by federal or state law. This includes, but is not limited to, security requirements and safeguards for the Family Educational Rights and Privacy Act (FERPA), Health Insurance Portability and Accountability Act (HIPAA), or Gramm-Leach-Bliley Act (GLBA).


This standard applies to all members of the UTHSC community entitled to email services.


C-3 Data: Defined by UTHSC Standards, data whose unauthorized disclosure could result in significant fines, penalties, regulatory action, or civil or criminal violations. Statutory, regulatory and contract obligations are major drivers for this risk level. Other drivers include, but are not limited to, the risk of significant harm or impairment to UTHSC students, patients, research subjects, employees, guests/program participants, UTHSC reputation, or the overall operation of the Location or essential services. This classification level also includes lower risk items that, when combined, represent increased risk. per Standard-InfoSec-GP-002 Data & System Classification.

Email: electronically delivered messages addressed to specific email account holders

Email Account: a NetID and password assigned to a user that allows access to email services

Sponsored NetID: a NetID not automatically generated for an active faculty, staff or student, but for someone affiliated with the University that needs access to specific systems. This type of NetID must be requested by a supervisor, business manager or department head.

UTHSC Business: any activity or communication supporting the mission of UTHSC. This includes communication between internal and external individuals while representing the interests of UTHSC for any UTHSC-related purposes.

UTHSC Information Technology (IT) Resource: Any data, device, or other component of the information environment that supports information-related activities. Assets generally include hardware (e.g. servers and switches), software (e.g. mission critical applications and support systems) and information.


Information Technology Services (ITS) is responsible for creating and maintaining UTHSC email accounts.

The Office of Cybersecurity is responsible for setting standards for the use of the UTHSC email system

System Custodian is responsible for configuring the appropriate controls for the UTHSC email system.

UTHSC User is responsible for adhering to this standard and the security controls set forth in it.


UTHSC Email Address and Accounts

Faculty and Staff

UTHSC email services must be used by faculty and staff to conduct and communicate University business. Incidental personal use of email is allowed with the understanding that the primary objective of this email service is UTHSC-related, and that occasional personal use does not adversely impact work responsibilities or the performance of the network.

Email services are provided only while a user is employed by the University, or 30 days after separation if the user has left on good terms. Once a user’s electronic services are terminated, employees may no longer access the contents of their mailboxes, nor should they export their mailbox to a personal account before departure. Upon separation, email contained in the account remains the property of the UTHSC. Retirees that wish to continue the use of a UTHSC email address must have a sponsored account. See Sponsored Accounts below.

Faculty and staff email users are advised that electronic data (and communications using the University network for transmission or storage) may be reviewed and/or accessed by authorized University officials for purposes related to University business per GP-003 Expectation of Privacy. UTHSC has the authority to access and inspect the contents of any equipment, files, or email on ITS resources. 


Email services are available for students to support learning and for communication by and between the University and themselves. The services are provided only while a student is enrolled in the University, or up to one year after the end date of the last term the student attended UTHSC classes. Once a student’s electronic services are terminated, students may no longer access the contents of their mailboxes. Upon separation, email contained in the account remains the property of the UTHSC.

Student email users are advised that electronic data (and communications using the University network for transmission or storage) may be reviewed and/or accessed per GP-003 Expectation of Privacy. UTHSC has the authority to access and inspect the contents of any equipment, files, or email on ITS resources. 

Sponsored Accounts

Individuals with special relationships with UTHSC who are neither employed nor enrolled at UTHSC, are granted limited email privileges, including an email address, commensurate with the nature of their relationship with the University with a sponsored NetID account. This type of account must be requested by a supervisor, business manager or department head. UTHSC is free to discontinue these privileges at any time.

Acceptable Use under University Policies

Email users have a responsibility to learn about and comply with UTSA Policy IT0110, Acceptable Use of Information Technology Resources and GP-004-Acceptable Use of IT Resources. Violation of UTHSC standards and practices (including this one) may result in disciplinary action dependent upon the nature of the violation. Examples of prohibited uses of email include, but not limited to:

  • Intentional and unauthorized access to other people’s email
  • Sending “spam”, chain letters, or any other type of unauthorized widespread distribution of unsolicited mail
  • Use of email for commercial activities or personal gain (except as specifically authorized by University policy and in accord with University procedures)
  • Use of email for partisan political or lobbying activities
  • Sending of messages that constitute violations of the University of Tennessee’s HR-0580-Code of Conduct
  • Creation and use of a false or alias email address in order to impersonate another or send fraudulent communications
  • Use of email to transmit materials in a manner which violates copyright laws

Abuses of UTHSC’s email services should be directed to the Office of Cybersecurity at

Security and Privacy of Emails

UTHSC attempts to provide secure, private, and reliable email services by following sound information technology practices. However, there are always emerging risks that allow attackers to compromise the confidentiality, integrity, and availability of our emails. Therefore, email users should exercise extreme caution in using UTHSC email to communicate sensitive matters. All data contained within an email message, or an attachment, must be secured commensurate with the criticality of the information per GP-002-Data & System Classification.

Email is a business record if there exists a legitimate and ongoing business reason to preserve the information contained in the email. In that case, the email must be retained according to pertinent University of Tennessee and/or State retention requirements. Users of UTHSC email services also should be aware that the Tennessee Public Records Act & Tennessee Sunshine Law (Open Meetings Act) and other similar laws jeopardize the ability of UTHSC to guarantee complete protection of email.

Best Practices in Use of Email

C-3 Data or Information

When sending information categorized as C-3, per GP-002-Data & System Classification (such as data covered by HIPAA and FERPA), the user must encrypt the message if sent via email. To encrypt an email, add the word encrypt anywhere in the subject line of an email sent from the sender’s UTHSC account. More information about encrypted email is found at The University of Tennessee UT Vault can also be used to send encrypted messages. Students, staff, and faculty members from any UT institution can send and receive encrypted emails, including emails from non-UT entities. More information on UT Vault is found at

UTHSC email users should be careful not to open unexpected attachments from unknown or even known senders, nor follow web links within an email message unless the user is certain that the link is legitimate. Following a link in an email message executes code, that can also install malicious programs on the workstation.

Identity Theft
Forms sent via email from an unknown sender should never be filled out by following a link. Theft of one’s identity can result. 

Password Protection
UTHSC requires the use of strong passwords for the protection of our NetID and email. Requirements for a UTHSC password is given in AC-002.02-Password Management and Complexity.

Departmental Email Boxes
Departments that provide services in response to email requests should have a shared mailbox created to help support departmental functional continuity for managing requests sent via email. These accounts should have one owner accepting responsibility for the account and must be monitored.

Forwarding Email
UTHSC email users may not forward emails to a non-UTHSC email address.

Staff email users on an extended absence should create an Out of Office message, which should include the contact information for another staff member who can respond while the user is away from the office.

Staying Current
Official University communications such as urgent bulk email, course email, and the Daily Digest should be read on a regular basis since those communications may affect day-to-day activities and responsibilities.

Compromised Accounts
An email account that has been compromised, whether through password-cracking, social engineering, or any other means, must be promptly remedied with the appropriate means. Such appropriate means will include a password reset, review of account settings, computer scans, and malware disinfection to prevent possible leakage of PII, spamming, potentially infecting others, and degradations of network service.  If the account is being used to harm UTHSC, the Chief Information Security Officer (CISO), the Deputy CISO, or designee will direct the ITS Infrastructure Team to disable the account until remediations can occur.


Email users must not give the impression that they are representing, giving opinions, or otherwise making statements on behalf of UTHSC or any unit of UTHSC unless appropriately authorized (explicitly or implicitly) to do so. Where appropriate, an explicit disclaimer shall be included unless it is clear from the context that the author is not representing UTHSC. Refer to SC-002.01-Offical Communications Use & Protections for guidance.

Alternative Means of Communication

Users should be aware that there are alternative means of communication that may be more efficient than email. For example, the use of Microsoft Teams for individual or group conversations and meetings is an approved and appropriate alternative that allows for flexibility during collaborations.


  1. UTSA IT Policy 0110 – Acceptable Use of Information Technology Resources
  2. HR-0580-Code of Conduct
  3. GP-002-Data & System Classification
  4. GP-003 Expectation of Privacy
  5. GP-004-Acceptable Use of IT Resources
  6. AC-002.02-Password Management and Complexity
  7. SC-002.01-Offical Communications Use & Protections