Frequently Asked Questions
The following is a list of frequently asked questions (FAQs) concerning abuse complaints and the way these incidents are processed. If after reading it you still have a question, send it to email@example.com
What happens after the Abuse Team receives a report?
If the incident puts the security of the network and other computing devices at the University at risk, the Abuse Team attempts to notify a responsible party (individual/departmental contact) for the device causing the problem. We try to provide sufficient information so the recipient of the message can determine which device is being reported. Each report contains language similar to:
If no response is received within the indicated time frame, the Abuse Team will take steps to prevent the device from continuing to cause problems. The above process varies depending on the ability to locate a contact for a problematic device, and the nature of the problem it is causing. The Abuse Team may respond to more serious problems by calling the contact for the device or even by putting an immediate block on the device without prior notification.
If the Abuse Team continues to receive new reports that a device is causing a problem after the owner reports the device fixed to firstname.lastname@example.org, this is cause for an immediate block with no warning.
How do I stop unsolicited email messages?
Many of these messages originate from sites that forge mail headers to disguise the true source. Some of the forged headers implicate sites that have strong responsible computing orientations and have nothing to do with the delivery of the message to you.
Do not reply to the sender or click on any links in these messages. Do not download or open any attachments. Although the University blocks the vast majority of spam messages coming into our servers, some occasionally get through. Deleting them is the most effective way to deal with them.
If either the nature of the message content or the volume of mail you are receiving creates a problem for you, please feel free to contact the Abuse Team, so we can look into your specific situation. Please include the message text and the full headers of any one of the messages that concerns you.
Does the University censor individuals' web pages?
No, the University does not censor individuals' web pages. This community is committed to the Jeffersonian ideals of intellectual inquiry and responsible free speech. The University enforces all applicable state and federal legislation within this context, and expects members of this community to act responsibly with technology resources. Violations of applicable laws are not permitted and may result in disciplinary action, including the loss of access to University technology resources.
Is it possible to catch a computer virus just by reading an email message?
Generally speaking, you cannot catch a computer virus just by reading an email message. You might, however, receive an email message with an attachment, and the attachment could be infected with a computer virus. When you double-click on an attachment to a message, you execute a program, which goes beyond simply reading an email message, and that could infect your computer. In an effort to make mail easier to use, some manufacturers have begun to execute attachments automatically, or to support software, like Java, embedded in mail. If you open the attachment without checking it first with virus protection software, you could infect your computer with the virus.
Why didn't the Abuse Team do something about the offensive email I reported?
The Abuse Team intervenes when there has been a violation of University technology policies and/or statutes. One of the guiding principles of our community is that individuals are responsible for their actions, including their behavior in cyberspace. Unfortunately, it is not always easy to determine when a violation of University policies has occurred. Sending someone a rude or offensive message, for example, does not automatically constitute an abuse of University technology resources or statutes. If an individual, however, emails an offensive message to someone and forges this message to make it appear as though someone else wrote it, this action would be considered misuse of University resources, and the Abuse Team would intervene. It is sometimes a difficult distinction to make. Some communications, while obnoxious or hurtful, do not necessarily constitute an abuse situation. In situations where the complaint is not a technology abuse issue, members of the Abuse Team advise affected individuals about other courses of action available to them.
Abuse of Information Technology