Comp Use

By August 28, 2013

Computers and network resources can provide access to resources both on and off campus. Such open access is a privilege, and requires that individual users act in a responsible and acceptable manner. Acceptable use always is ethical, reflects academic honesty, and shows restraint in the consumption of shared resources. Acceptable use demonstrates respect for intellectual property, truth in communication, ownership of data, system security mechanisms, and individuals’ right to privacy and freedom of intimidation, harassment, and unwarranted annoyance. The university considers any violation of acceptable use principles or guidelines to be a serious offense and reserves the right to test and monitor security, and copy and examine any files or information resident on university systems allegedly related to unacceptable use.

Comp use

By August 28, 2013

Conduct which violates this policy includes, but is not limited to the activities in
the following list:
[…]
Using electronic mail to harass or threaten others. This includes sending
repeated, unwanted e-mail to another user.
• Initiating or propagating electronic chain letters.
• Inappropriate mass mailing. This includes multiple mailings to newsgroups,
mailing lists, or individuals, e.g. “spamming,” “flooding,” or “bombing.”
[…]
• Transmitting or reproducing materials that are harassing, slanderous or
defamatory in nature, or that otherwise violate existing laws or GSC University
System of New Hampshire regulations.
Displaying obscene, lewd, or sexually harassing images or text in a public
computer facility or location that can be in view of others.