Unsolicited commercial e-mail, commonly referred to as “Spam”, includes, but is not limited to, advertising e-mail, e-mail containing pyramid schemes, chain letters, e-mails containing unwanted questionable subject matter, and abusive or threatening e-mail. Spam is often denoted by e-mail that contains a false or misleading header, subject-line, identification of the sender, return address, routing or transmission path, or other false indication of origin, sometimes using a third party domain name without permission. In addition, Spam includes e-mail that advertises goods or services that has been sent without the consent of the recipient, or without a preexisting relationship between the sender and recipient.
The University’s goal is to minimize the impact of Spam on the User community and IT Resources by implementing appropriate policies and technology. Users and third parties are prohibited from using the University’s IT Resources to send Spam or to send any electronic correspondence in violation of this IT Policy or any applicable policy, law, rule, or regulation pertaining to unsolicited or bulk messages. The University reserves the right to refuse e-mail or other connections from outside hosts that send any messages that appear to be unsolicited, meant for mass distribution, commercial in nature without prior approval of the intended User-recipient, prurient, offensive, or containing viruses, worms, or other malicious computer code. The University will use all available technology at its disposal to block such Spam.
To make certain that e-mail is a resource readily available, Users should note the following:
A. E-mail Anti-Relay Policy
E-mail relay is the transparent transmission of e-mail between networked systems either local or on the Internet. The problem with e-mail relaying is that, if not configured properly within an institution, it can be misused. For example, it might be used by anyone in the world to send bulk mailings while masking or concealing the identity of the sender. To curtail abuse, only those individuals who are identifiable Users of the University community may access and use the IT Resources’ e-mail sending capabilities.
B. Bulk E-mail Policy
Bulk e-mailing, or e-mail “bombing”, is characterized by abusers repeatedly sending an e-mail message to a particular address or addresses at a specific victim site or address. In many instances, the messages are large and constructed from meaningless data in an effort to consume additional system and network resources. Multiple accounts at the target site may be compromised, increasing what is called a “denial of service” impact. The University will not tolerate the targeting of a User’s e-mail account, or any combination of User accounts, by another User or third party, where such targeting appears to be for the purposes of harassing, irritating, or interfering with that User’s or those Users’ normal use of e-mail. Accordingly, Users are prohibited from using the University’s systems to damage, disable, overburden, or impair any of the IT Resources, or analogous third-party systems and resources. Such violations will be referred to the appropriate University or outside authorities in accordance with this IT Policy.