Appropriate Use of Information Technology Policy

Relevant excerpt

While it is not possible to specify a rule for every possible use or misuse of IT resources, persons to whom this policy applies are expected to act in accordance with the following examples: … Special care to avoid activity that is or could be perceived as intimidating, harassing or threatening.

Download PDF