computer harassment

By August 28, 2013

No one may, under any circumstances, use Rensselaer’s computer systems or networks to libel, slander, or harass any other person.

Computer Harassment includes, but is not limited to, using Rensselaer’s computer systems or networks: (1) to annoy, harass, terrify, intimidate, threaten, offend or bother another person (for example, by conveying abusive, profane, defamatory or offensive messages, obscene language, pictures, or other materials, or threats of bodily harm); (2) to contact another person repeatedly to annoy, harass, or bother, whether or not any actual message is communicated, and/or where no purpose of legitimate communication exists, and where the recipient has expressed a desire for the communication to cease; (3) to contact another person repeatedly regarding a matter for which one does not have a legal right to communicate, once the recipient has expressed a desire for such communication to cease; (4) to disrupt or damage the academic, research, administrative, or related pursuits of another; (5) to invade or threaten to invade the privacy, academic or otherwise, of another.

computer harassment

By August 28, 2013

The following are examples of improper use of the Computer System:

Harassment: Harassing others by sending annoying, abusive, profane, threatening, defamatory or offensive messages is prohibited. Some examples include: obscene, threatening, or repeated unnecessary messages; sexually, ethnically, racially, or religiously offensive messages; continuing to send messages after a request to stop; and procedures that hinder a computer session.

computer harassment

By August 28, 2013

Access on Indian River State College computer equipment of
materials of a sexual or ethnically derogatory nature is in violation of
the College policy on harassment which assures a positive learning
environment. Violation may result in disciplinary action.

Computer harassment

By August 28, 2013

8. All users have the right to use the computer free from outside interference and
distractions. Therefore, users may not harass others (e.g. by sending annoying, obscene,
libelous or threatening messages). Users may not provide others with programs or files
that cause damage to their files or the operation of the computer system, compromise the
security of their accounts, or disable their account (Student Handbook, Faculty/Staff
Handbook).