Information Technology: Understanding Acceptable Computing Access and Use Policies
University of Pittsburgh
Relevant Excerpt
The following are considered improper uses of University-owned computing equipment, networks, services, and resources:
...
- Using electronic media to harass or threaten other persons, or to display, design, copy, store, draw, print, or publish obscene language or graphics.