Acceptable Use and Security of Johns Hopkins Information Technology Resources
Johns Hopkins University
Relevant Excerpt
Unacceptable use of IT Resources includes, but is not limited to, the following:
...
3. Communications
a. Sending or posting threatening, harassing or defamatory messages or other communications in violation of Johns Hopkins policies and/or applicable law;
b. Sending or posting messages or other communications that appear to come from a party other than the sender, without that party’s prior authorization;
c. Activities that constitute a hostile work environment under Title VII, Title IX, and other applicable laws;
d. Use (e.g. e-mail, social media, blogs), without specific authorization, to imply JH support -- as opposed to personal support -- for any position or proposition; ...