Policies and Procedures: 9.54 Acceptable Use of Information Technology Resources

Relevant excerpt

Key prohibitions include:

Creating or forwarding anonymous, deceptive, fraudulent, or unwelcome electronic communications, such as chain letters or solicitations for business schemes.

Download PDF