Policies and Procedures: 14.04 Acceptable Use of Information Technology Resources
University of Northern Iowa
Relevant Excerpt
Key prohibitions include:
...
Creating or forwarding anonymous, deceptive, fraudulent, or unwelcome electronic communications, such as chain letters or solicitations for business schemes.