Montana State University
Public University
Bozeman, Montana
Speech Code Rating
Equal Opportunity, Non-Discrimination and Harassment Policy
Discriminatory Harassment is: unwelcome conduct on the basis of actual or perceived protected characteristic(s), as identified in section 1000.10, that based on the totality of the circumstances, is subjectively and objectively offensive, and is so severe or pervasive, that it limits or…
MSU Policies and Procedures: Conduct Guidelines and Grievance Procedures for Students- Code of Student Conduct
330.50 Assault and Harm to Persons ... Bullying and Cyberbullying are repeated and/or severe aggressive behaviors that intimidate or intentionally harm or control another person physically or emotionally and are not protected by freedom of expression.
MSU Policies and Procedures: Conduct Guidelines and Grievance Procedures for Students- Code of Student Conduct
330.50 Assault and Harm to Persons ... Bullying and Cyberbullying are repeated and/or severe aggressive behaviors that intimidate or intentionally harm or control another person physically or emotionally and are not protected by freedom of expression.
MSU Policies and Procedures: Freedom of Expression Policy
The following forms of expression are not protected forms of speech and may lead to individuals or groups being subject to disciplinary, administrative or legal action: ... Harassment, including speech and other conduct based on a protected class, targeted at an individual…
Board of Regents Policy & Procedures Manual: Policy 1304.1- User Responsibilities- Students
GUIDELINES: RECOMMENDATIONS, NOT REQUIREMENTS: Examples of Misuse of Information Technology Resources The following items represent, but do not fully define, misuse of information technology resources. Note that many of these examples may be considered appropriate uses of technology resources in specific academic…
MSU Policies and Procedures: Conduct Guidelines and Grievance Procedures for Students- Code of Student Conduct
330.100 Theft/Misuse of Property ... D. Theft or other abuse of IT Resources, capabilities, and/or accounts, including but not limited to: ... Use of computing facilities or resources to send harassing or abusive messages.