Student Handbook: Appropriate Use of Information Technology Resources

Relevant excerpt

The following are examples of violations of information technology resources policies at Hamilton College. …

Inappropriate use of electronic mail and Internet access. Initiating or propagating electronic chain letters; inappropriate mass mailing including multiple mailings to newsgroups, mailing lists, or individuals, forging the identity of a user or machine in an electronic communication or sending anonymous email; using another person’s email account or identity to send email messages; attempting to monitor or tamper with another user’s electronic communications; reading, copying, changing, or deleting another user’s files or software without the explicit agreement of the owner; or using email or personal web page advertising to solicit or proselytize others for commercial ventures, religious or political causes, or for personal gain.

Download PDF