acceptable use

August 28, 2013

In making acceptable use of resources, you must NOT:

Use resources to intimidate or single out individuals or groups for degradation or harassment in violation of federal or state law and other university policies.

acceptable use

August 28, 2013

You must not upload, post, or transmit content that is threatening, harassing, defamatory, libelous, invasive of another’s privacy. This includes but is not limited to social networking sites, blogs, e-mail or other electronic correspondence.

acceptable use

August 28, 2013

While the Internet is considered a public electronic highway, the Stevens network is a private resource. As such, access and use of the network must [be] in accordance with Stevens’ rules and policies as well as all legal regulations. Therefore, the following actions are strictly prohibited:

* Use of offensive or discriminatory language.
* Transmission of any graphic image, sound or text that is sexual in nature.
*Harass, threaten, or otherwise invade the privacy of others.

acceptable use

August 28, 2013

The following rules must be observed: Never send or forward unsolicited e-mail, including chain mail … Never send harassing, annoying, threatening, defamatory, offensive, or fraudulent messages or images to
others.

acceptable use

August 28, 2013

It is prohibited to use electronic communication facilities such as mail, phone, Internet or systems with similar functions to send fraudulent, harassing, obscene, indecent, profane, intimidating, or unlawful messages that are sufficiently severe, pervasive, or persistent and are objectively offensive as to substantially disrupt or undermine a person’s ability to participate in or receive the benefits, services or opportunities of the College.

acceptable use

August 28, 2013

Material that is explicitly sexual or offensive may not be displayed, consistent with the Brandeis University Policy Statement on Non-discrimination and Harassment.

acceptable use

August 28, 2013

The following behaviors are prohibited while using College technology resources or to resources in which FSU is connected or affiliated with: … Sending messages that are malicious or that a reasonable person would find to be harassing.

acceptable use

August 28, 2013

Never act in such a way that another user would feel uncomfortable accessing systems–for example, by sending or presenting harassing, intimidating, abusive or patently unwanted material to others. This includes presentation in messages, on screen and in print where others might see.

Acceptable Use

August 28, 2013

The following are examples of uses that are unacceptable:
[…]
harass or intimidate another person, such as repeatedly sending unwanted mail or sending threatening mail.