Individuals using computer resources belonging to The University of Arizona must act in a responsible manner, in compliance with law and University policies, and with respect for the rights of others using a shared resource. The right of free expression and academic inquiry is tempered by the rights of others to privacy, freedom from intimidation or harassment, protection of intellectual property, ownership of data, and security of information.” Although this policy seems fairly straightforward, the ten “Acceptable Use Guidelines” meant to clarify this policy instead introduce confusion. For example, Guideline 3, which instructs the computer user to “clearly and accurately identify one's self in electronic communications,” adds: “Do not forge or misrepresent one's identity. Concealing or masking the identity of electronic communications such as altering the source of an email message by making it appear as if the message was sent by someone else is a violation of this policy.”14 So a student knows that altering the sender of an e-mail is against policy, but what about creating an avatar? And what about the faculty member who asks students to create an avatar with a totally fictitious name? Are the faculty member and the students in violation of this policy?