Policy 6-10: Acceptable Use of Information Technology

Relevant excerpt

The following activities are strictly prohibited. … Sending or attempting to send harassing, obscene, or other threatening e-mail to another user. … Encroaching on other’s use of shared computing resources. Such encroachment shall include, but is not limited to, creating a disturbance, displaying offensive material on shared equipment, or otherwise interfering with others’ use of shared computing resources.

Download PDF