Jump to ContentJump to Navigation
Security Awarness For Everyone
Centers for Disease Control and Prevention
Site Contents
 Main Page
 Passwords
 PC Security
 Backups
 Physical Security
 Social Engineering
 E-mail Usage
 Internet Usage
 Viruses
 Software Piracy
 Who to Contact

E-mail Usage

 E-mail can be misused both intentionally and unintentionally, and while critical to getting our job done efficiently, has its share of risks to the organization. The level of risk to the organization varies with the kind of incident, ranging from slow system response to potential lawsuits, fines, or congressional inquiry. Increasingly, however, those who display objectionable material in the workplace, or who send objectionable material via E-mail put themselves and the agency at risk of suit or increased oversight. Remember that your address ends in "cdc.gov". Whenever you go to a web site, or send an E-mail, the "cdc.gov" tag is included. Audit logs can capture such information, and these logs later can find their way to unknown destinations, sometimes with very embarrassing consequences. Examples of E-mail misuse are:

  • Chain letters
  • Incorrectly addressing an email with highly sensitive information
  • Spam (usually refers to messages the receiver does not desire)
  • Hoaxes and rumors

E-mail can also be used to introduce computer viruses into agency systems. If your personal action results in a cost of more than $5,000 to the agency, such as cleaning up after a virus, a report is required to be made to the Office of the Inspector General of HHS, according to HHS Policy.

The simplest thing to do with messages that are not related to agency business is to delete them. Remember that chain letters, spam and other types of e-mails not related to agency business are expressly prohibited by CDC policy. If you receive repeated unwanted messages, or if you receive messages containing threats against a person or the agency, or messages that you find offensive, or contain derogatory or ‘hate’ material, contact your LAN Administrator or your CIO ISSO.

See CIO ISSO list.

See CIO LAN Administrator list.

See Employee Use of CDC Information Technology Resources.

See About's Internet Hoaxes, Email Rumors and Urban Legends.

See HoaxBusters: Information About Hoaxes

See CDC's Health Related Hoaxes and Rumors

Go to Top
 

This CD-ROM was produced April 8, 2003
from the original content of "Security Awareness for Everyone."

Copywrite 2001 Security Awareness, Inc.

Centers for Disease Control and Prevention