Speech Code Rating

Policy and Procedures Related to Sexual Harassment and Sexual Violence

  • Policy Rating
    Yellow
  • Speech Code Category
    Harassment Policies
  • Last Updated
Clemson University prohibits discrimination on the basis of sex, including sexual harassment and sexual violence. (See Non-Discrimination and AntiHarassment Policy.) Harassment means unwelcome verbal or physical conduct directed toward a person or group of persons motivated by a protected characteristic that unreasonably…

Non-Discrimination and Anti-Harassment Policy

  • Policy Rating
    Yellow
  • Speech Code Category
    Harassment Policies
  • Last Updated
Harassment: in general, is unwelcome verbal or physical conduct directed toward a person or group of persons motivated by a protected characteristic that is so severe, pervasive, or persistent that it unreasonably interferes with the person’s work or educational performance or creates…

Facility Use Policy: Speech and Assembly

  • Policy Rating
    Green
  • Speech Code Category
    Protest and Demonstration Policies
  • Last Updated
Although prior registration of demonstrations and protests by students, faculty, or staff or affiliated groups is not mandatory, it is strongly recommended. Prior registration and planning ensures that the desired space will be available on the appropriate date and time. Prior registration…

Student Code of Conduct: Purpose

  • Policy Rating
    Green
  • Speech Code Category
    Advertised Commitments to Free Expression
  • Last Updated
Academic institutions exist for the transmission of knowledge, the pursuit of truth, the development of students and the general well-being of society. Free inquiry and free expression are indispensable to the attainment of these goals.

Student Code of Conduct: Computer Misuse

  • Policy Rating
    Green
  • Speech Code Category
    Internet Usage Policies
  • Last Updated
Computer Misuse a. No student shall allow any person to use their ID and/or password; create access into the computing network in such a way that will bypass University security systems; attempt unauthorized access and use other computing resources or data; violate…
Share