Information Technology Policies: Harassment, Threats, Stalking, and Similar Activities

University of North Carolina - Wilmington

  • Speech Code Rating
  • Speech Code Category
    Internet Usage Policies
  • Last updated
Download PDF

Relevant Excerpt

A. Users may not use electronic communications to harass, stalk, or threaten others, or in similar ways create an atmosphere which unreasonably interferes with educational or employment experience. Generally, communication that contains true threats or intimidating language and is repeated, unsolicited, unwanted or unwelcome may constitute harassment. Procedures for reporting prohibited behaviors are detailed in Policy 02.205 Unlawful Discrimination, Harassment and Sexual Misconduct, and Policy 08.540 Workplace Violence Policy and Protocol.

B. This usage includes, but is not limited to, posting, transmitting or originating any unlawful, threatening, harassing, fraudulent or defamatory communication. It also includes any communication where the message, or its transmission or distribution, would constitute or encourage conduct that would constitute a criminal offense, give rise to civil liability or otherwise violate any local, state, national, or international law or violate other policies, rules and regulations of the university. Information that is defamatory is defined as provably false, unprivileged statements that do demonstrated injury to an individual’s or a business’s reputation.