Student Handbook: Computing Resources, Network and Email Use Policy

Relevant excerpt

Neither the network pathways nor W&L-owned computer systems are to be used: … for harassing, fraudulent, or threatening purposes.

Download PDF