Is My Computing Device Being Monitored?
Under section 5.6, Ownership of Information, of the IPA Information Security & Privacy policy,
IPA reserves the right, without prior notice, to access, block, monitor, audit, review, search, inspect, delete, and/or disclose any message, communication, file, or voice message that is or was generated on a computer or portable device owned, leased, operated, or maintained by IPA at any time or for any reason. The use of a password, encryption, or the deletion of a document or information does not limit IPA’s ability to audit, access, disclose, and/or review the use of its systems in the normal course of business.