Information Technology Services: Computer and Network Use Policy
Binghamton University, State University of New York
Relevant Excerpt
Users must refrain from activities that abuse these tools such as: ...
b. Propagating chain letters or spam.
Users must refrain from activities that abuse these tools such as: ...
b. Propagating chain letters or spam.