Information Security Policy

Relevant excerpt

Members may not use University IT resources for the following: …¬†engaging in activities that may harass, threaten, or abuse others.

Download PDF