4-OP-H-5 Information Security Policy

Relevant excerpt

Members may not use University IT resources for the following: … engaging in activities that may harass, threaten, or abuse others;

Download PDF