Gen 1.3.(1): Acceptable Use of Computing Resources Policy

Relevant excerpt

Examples of inappropriate and unacceptable use of computing and networking resources include, but are not limited to, the following:

Use of e-mail or messaging services to harass, intimidate, or otherwise annoy another person, for example, by broadcasting unsolicited messages or sending unwanted mail.

Download PDF