Alabama State University Policy Regarding Abuse of Computers & Network Systems

Relevant excerpt

Policy violations fall into four categories that involve the use of electronic communications to:

Harass, threaten, or otherwise cause harm to specific individuals, for example, sending an individual repeated and unwanted (harassing) e-mail or using e-mail to threaten or stalk someone.

Download or post to University computers, or transport across University networks, material that is illegal, proprietary, in violation of University contracts, or otherwise is damaging to the institution, for example, launching a computer virus, distributing pornography via the web, or posting a University site-licensed program to a public bulletin board; Other examples include information dealing with cults or the occult, hacking, hate speech, nudism and naturalism, peer to peer file sharing, adult pornography, sexual orientation, and weapons.

Download PDF