The Information Security Officer has authority to examine, or authorize examinations of, electronic mail messages, portable storage devices, files on desktops and laptops, web browser cache files, web browser bookmarks, and other information stored on or passing through University computing resources when data compromise is suspected.