Information Technology Policies: Harassment, Threats, Stalking, and Similar Activities

Relevant excerpt

A. Users may not use electronic communication to harass, stalk, or threaten others, or in similar ways create an atmosphere which unreasonably interferes with the education or employment experience. Generally, communication that contains true threats or intimidating language and is repeated, unsolicited, unwanted or unwelcome may constitute harassment.

B. This would include, but not be limited to, posting, transmitting or originating any unlawful, threatening, harassing, fraudulent or defamatory communication, or any communication where the message, or its transmission or distribution, would constitute or would encourage conduct that would constitute a criminal offense, give rise to civil liability, or otherwise violate any local, state, national, or international law or violate other policies, rules, and regulations of the University. Information that is defamatory is defined as provably false, unprivileged statements that do demonstrated injury to an individual’s or a business’ reputation.

Download PDF