2. POLICY STATEMENTS
When using Notre Dame’s information technology resources, users must:
...
2.7 Understand that uses of information technology resources are not completely private.
The normal operation and maintenance of the University’s technology resources require
backup and caching of data and communications, logging of activity, monitoring of general
use patterns, and other such activities that are necessary to provide service.
The University reserves the right to inspect any activities or accounts of individual users of
University information technology resources, including individual login sessions and
communications, without notice, unless otherwise prohibited by law. The University may
inspect such information technology resources under circumstances when the University
determines inspection is necessary, including but not limited to the following:
a. To protect the integrity, security, or functionality of University or other information
technology resources, or to protect the University from harm;
b. There is reasonable cause to believe that the user has violated, or is violating, any Notre
Dame policy or applicable civil or criminal law; or
c. An information technology resource appears to be engaged in unusual or unusually
excessive activity, as indicated by monitoring of general activity and usage patterns.
Under normal circumstances, the General Counsel and the individual’s dean/director or vice
president, in consultation with the Chief Information Officer, must approve in advance any
individual inspection, other than that which is voluntary, required by law, or necessary to
respond to emergency situations.
The University, in its discretion, may use or disclose the results of any such inspection,
including the contents and records of individual communications, as it considers appropriate to University personnel, third parties, or law enforcement agencies.