Information Technology Acceptable Use Policy (AUP)
University of Massachusetts – Boston
Relevant Excerpt
The following activities are by no means exhaustive but attempt to provide a framework for activities that are strictly prohibited:
...
Using computer programs to decode passwords, access control information, send chain emails, spam, or phishing emails, generating excessive printing and other inappropriate behavior.