Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

Statement and Purpose


Table of Contents


Administrative access to an individual's email, documents, or other electronic resources through a snapshot requires approval from a Vice President or the President of the company. This step ensures that such access is granted only for legitimate business reasons and maintains a high standard of privacy and respect for employee rights.

Certain terms in this policy are defined at the end of the policy.

Download Policy as PDF

Entities Affected By This Policy

All University faculty and staff.

Reason for Policy

This policy is designed to balance the company's need for information security and employee privacy, maintaining a respectful and legally compliant workplace.



Policy Version: 1.0

Responsible Office: Computer & Information Systems
Responsible Executive:
  AVP of Technology Services/CIO

Effective Date: July 1, 2010
Last Updated:
  January 16, 2024


Collaborate with Employees


Seattle Pacific University values the privacy of its constituents.  Whenever feasible, Seattle Pacific University and employee supervisors should first attempt to work collaboratively with the individual or employee in question to access or preserve email, documents, or other information. Access through an administrative override is to be considered a last resort and should only be used in rare cases.

Use of Administrative Access


Administrative access and override capabilities should only be employed in exceptional circumstances and with the utmost respect for the individual's privacy. These instances must be well-justified and documented, reflecting the seriousness of bypassing standard access protocols.  

Separation of Responsibilities

  • Executive Role: The appropriate area Vice President or the SPU President must approve any administrative access.
  • Computer and Information Systems Role: Upon receiving approval, CIS is responsible for executing the snapshot or granting access to the individual's resources. This process must be carried out with utmost care to ensure data integrity and confidentiality.
  • No CIS Review of Content: CIS will not participate in the review or analysis of the contents obtained from a snapshot. CIS's role is strictly limited to the technical aspects of data retrieval. This is to maintain a strict separation of responsibilities to prevent abuse.


Any administrative access of an individual's account not done in accordance with this policy and separation of responsibilities is grounds for immediate termination in accordance with the Privileged System Access Policy.

Resource Ownership 

The Computer Acceptable Use Policy and the Computer User Accounts and Resources states that accounts and resources granted by the University are property of the University.   Administrative access is allowed to any resources is allowed, 

  • No labels