Policy 6-10: Acceptable Use of Information Technology
Fort Lewis College
Relevant Excerpt
The following activities are strictly prohibited. ... Sending or attempting to send harassing, obscene, or other threatening e-mail to another user. ... Encroaching on other's use of shared computing resources. Such encroachment shall include, but is not limited to, creating a disturbance, displaying offensive material on shared equipment, or otherwise interfering with others' use of shared computing resources.