Information Security Office: Acceptable Use Policy for University 果冻传媒app官方
University of Texas at Austin
Relevant Excerpt
Electronic communications should meet the same standards for distribution or display as if they were tangible documents or instruments. Identify yourself clearly and accurately in all electronic communications.
...
Examples of inappropriate use of resources are shown below. These actions frequently result in complaints and subsequent disciplinary action. 1. Sending an unsolicited message(s) to a large number of recipients (known as "spamming the network").