"Network-based system activity, such as sending e-mail messages, is automatically logged on a continuous basis. These logs include a record of user processes, message subjects, and other user-related data that may be examined by authorized system administrators when necessary to maintain or prevent damage to systems or to ensure compliance with Harvard Law School guidelines. In addition, contents of messages are stored on the system until deleted by the message recipient and may also be available on backup tapes; under certain circumstances, these may be examined in accordance with University guidelines.
last updated 28-Aug-2001 by: joanne@mit.edu