Information Technology: Acceptable Use
University of Massachusetts – Boston
Relevant Excerpt
Individuals in violation of this policy may be subject to disciplinary proceedings and/or legal action.
...
The following activities are by no means exhaustive but attempt to provide a framework for activities that are strictly prohibited:
...
Using computer programs to decode passwords, access control information, send chain emails, spam, or phishing emails, generating excessive printing and other inappropriate behavior.