Computer Use and Copyright Policy

Relevant excerpt

Prohibited actions under this policy, include, but are not limited to, the following:  … using email, messaging services, or any electronic communication service to harass, stalk or intimidate another person (e.g., by broadcasting unsolicited messages, repeatedly sending unwanted mail, or using another individuals’ name or user name).

Download PDF