Student Handbook: Appropriate Use of Information Technology Resources
Hamilton College
Relevant Excerpt
The following are examples of violations of information technology resources policies at Hamilton College. ...
Inappropriate use of electronic mail and Internet access: Activities that threaten the integrity of the system or harm individual users are not allowed. These include, but are not limited to initiating or propagating electronic chain letters; inappropriate mass mailing including multiple mailings to newsgroups, mailing lists, or individuals, forging the identity of a user or machine in an electronic communication or sending anonymous e-mail; using another person's e-mail account or identity to send e-mail messages; attempting to monitor or tamper with another user's electronic communications; reading, copying, changing, or deleting another user's files or software without the explicit agreement of the owner; or using e-mail or personal web page advertising to solicit or proselytize others for commercial ventures, religious or political causes, or for personal gain.