Appropriate Use of Information Technology Policy
Auburn University
Relevant Excerpt
While it is not possible to specify a rule for every possible use or misuse of IT resources, persons to whom this policy applies are expected to act in accordance with the following examples: ... Special care to avoid activity that is or could be perceived as intimidating, harassing or threatening.