Acceptable Use Policy
As of October 6th,
2017, the UW-System Board of Regents issued Regent Policy Document 25-3
Acceptable Use of Information Technology Resources. The policy is as follows:
Scope
This policy covers
authorized users who access information technology (IT) resources under the
control of the University of Wisconsin (UW) System including but not limited
to: currently enrolled students; employees; authorized contractors, vendors,
and guests; and other authorized users as determined by UW institutions.
Purpose
The purpose of this
policy is to outline the expectations of the Board of Regents regarding the
acceptable use of IT resources by authorized users and to establish the
parameters for the use of IT resources.
Policy Statement
IT resources are
essential tools in accomplishing the UW System’s mission of disseminating and
extending knowledge, fostering the free exchange of ideas, and providing
effective support for teaching, research, and public service functions. It is
the policy of the UW System Board of Regents that access to and use of UW
System IT resources is a privilege that extends to authorized users for use in
fulfilling the missions of the UW System and UW institutions, and for appropriate
university-related activities.
UW System IT resources
include all electronic equipment, facilities, technologies, and data used for
information processing, transfer, storage, display, printing, and
communications by the UW System and/or any UW institution. These include, but
are not limited to, computer hardware and software, computer labs, classroom
technologies such as computer-based instructional management systems, and
computing and electronic communications devices and services, modems, email,
networks, telephones, voicemail, facsimile transmissions, video, multi-function
printing devices, mobile computer devices, data, multimedia and instructional
materials. This definition also includes services that are owned, leased,
operated, provided by, or otherwise connected to UW System resources, such as
cloud computing or any other connected/hosted service provided.
Acceptable and Unacceptable Uses of
Information Technology Resources
Acceptable use of UW
System IT resources includes any purpose related to the direct and indirect
support of the System’s educational, research, service, student and campus life
activities; administrative and business purposes; financial systems; and human
resources administration. Authorized users are provided access to IT resources
in order to support their studies, instruction, research, duties as employees,
official business with the UW System and/or any UW System institution, and
other university-sanctioned activities according to their roles and
responsibilities.
Authorized users must
not engage in unacceptable use of UW System IT resources, which includes but is
not limited to the following:
1. Sharing or
transferring authentication details to others, or using another user’s
authentication credentials such as network IDs and passwords, or other access
codes or circumventing user authentication which could allow unauthorized users
to gain access to UW System IT resources, except as required for administrative
or business purposes;
2. Violation of
federal, state, or local laws; institutional policies, rules or guidelines; or
licensing agreements or contracts;
3. Harassment
of, threats to or defamation of others; creation of a hostile environment;
stalking; and/or illegal discrimination;
4. Widespread
dissemination of unauthorized email messages (e.g., mass mailings, spam, email
chain letters); or
5. Intentionally
damaging, disrupting, or exposing IT resources or data to unauthorized access
or harm.
In addition to the
examples stated above, unacceptable use of UW System IT resources for
employees, authorized contractors and vendors, also includes the following:
6. Storage,
display, transmission, or intentional or solicited receipt of material that is
or may reasonably be regarded as obscene, sexually explicit, or pornographic,
except as such access relates to bona fide, university-related academic or research
pursuits or as needed to investigate violations of this policy or laws;
7. Outside
employment, commercial activities, or other forms of private financial gain;
8. Campaigning
for public office or soliciting political contributions;
9. Political
lobbying, except for specific employees designated to lobby on behalf of the UW
System or one of its institutions;
10. Wagering or
betting, except as it relates to bona fide, university-related academic or
research pursuits;
11. More than minimal
use for private or personal purposes that interferes with work or job
performance or that interferes with the activities of other employees,
students, or other authorized users.
Authorized users must
not use UW System IT resources to speak on behalf of the UW System or use the
UW System trademarks or logos without authorization. Affiliation with the UW
System does not, by itself, imply authorization to speak on behalf of the UW
System. The UW System is not responsible for the content of documents,
exchanges or messages, including links to other information locations on the
internet that reflect only the personal ideas, comments, and opinions of
individual members of the university community, even when this content is
published or otherwise circulated to the public at large by means of UW System
IT resources.
Privacy and Security
The UW System shall
take reasonable measures to protect the privacy of its IT resources and
accounts assigned to authorized users. However, the UW System cannot guarantee
absolute security and privacy. Any activity on UW System IT resources may be
monitored, logged and reviewed by UW System-approved personnel or may be
discovered in legal proceedings or in response to public records requests.
Generally, the contents of user accounts will be treated as private and not
examined or disclosed except:
The UW System has the
right to employ appropriate security measures, to investigate as needed, and to
take necessary actions to protect UW System IT resources. The UW System may
also have a duty to provide information relevant to ongoing investigations by
law enforcement. UW institutions will work with authorized users to protect
their privacy interests, as well as those of the UW System.
Authorized users must
not violate the privacy of other users. Technical ability to access
unauthorized resources or others’ accounts does not by itself imply
authorization to do so, and it is a violation of this policy to access others’
accounts unless authorized to do so for a legitimate business purpose.
Other Limitations on Use of Information
Technology Resources
In addition to the
general principles set forth in this policy, the use of IT resources may be
affected by other laws and policies; included among these are: federal
copyright laws and privacy laws related to student records; state statutes
related to computer crimes and political activities of state employees; ethical
standards of conduct; dismissal for cause; standards and disciplinary processes
related to academic and nonacademic misconduct by students; and conduct on
university lands.
Failure to Comply with Information Technology
Resource Policies
Failure to adhere to
the provisions of this policy may result in the suspension or loss of access to
UW System IT resources; appropriate disciplinary action as provided under
existing procedures applicable to students, faculty, and staff; civil action;
or criminal prosecution. To preserve and protect the integrity of UW System IT
resources, there may be circumstances where a UW institution may immediately
suspend or deny access to the resources.
Oversight, Roles, and Responsibilities
This policy
constitutes the UW System’s policy on the acceptable use of IT resources. It
applies systemwide and may not be replaced, superseded, or substantially
recreated by other systemwide or institutional policies. Institutions may
supplement this policy only for specific programs or services after
consultation with the UW System Chief Information Officer. In order to assist
members of the university community in fulfilling their responsibilities with
respect to use of IT resources, each UW System institution shall post this
policy on its website.
It is the
responsibility of authorized users to comply with this policy.
The chancellor is
responsible for implementing this policy and operating the institution’s IT
resources consistent with the above-stated provisions.
Related Regent Policies and Applicable Laws
The Regent Policy
Document 25-3 is located at: https://www.wisconsin.edu/regents/policies/acceptable-use-of-information-technology-resources/
UW-Whitewater
Campus Guidelines
Approved: March 27, 2017
Scope
The University of Wisconsin (UW)-Whitewater
Network (the "Network") incorporates all electronic communication and
computing equipment, along with associated peripherals and infrastructure at locations
both on the UW-Whitewater campus, and at off-campus educational and research
centers or external service providers. The Network is provided to support the
University's mission of education, research, and service as well as to provide
support for administrative needs. Any other uses, including uses that
jeopardize the integrity of the Network, the privacy or safety of other Users,
or that are otherwise illegal are prohibited.
By using or accessing the UW-Whitewater campus
network or resources under the control of the UW-Whitewater residing at other
locations, you agree to adhere to all local, state and federal laws, and all
other applicable University and UW-System policies and guidelines. You are
responsible for staying informed about University policies regarding the use of
computer and network resources. You are also responsible for complying with all
applicable polices. The current UW-Whitewater Network Infrastructure Use
Policy, UW-Whitewater Email Policy and other policies dictating access to information
resources can be found at http://uww.edu/icit/policies-agreements.
The current UW System Information Security Acceptable Use and other policies
related to Information Security can be found at https://www.wisconsin.edu/uw-policies/uw-system-administrative-policies/
Appropriate and Reasonable Use Definitions
Appropriate and responsible use of the
University of Wisconsin-Whitewater's computing and networking infrastructure,
as well as electronic information, is defined as use that is consistent with
the teaching, learning, research and administrative objectives of the
University. Appropriate use includes: instruction, independent study, research,
communications, and official work of UW-Whitewater units, recognized campus
organizations, and entities or persons formally associated with the University.
Unacceptable Use
The following activities are NOT acceptable
use of the campus network resources:
Network Security Requirements
Information security at UW-Whitewater is a
shared responsibility of all users. To maintain security users must adhere to
the following guidelines:
Access Restrictions
Access to campus network resources may be
wholly or partially restricted by the University without prior notice and
without the consent of the user when:
The individual will be notified of the reason
and duration of the access restriction as soon as possible. Access will be
restored when the situation has been resolved. Penalties for violating
University of Wisconsin-Whitewater and UW-System policies may include:
Confidentiality
While all efforts will be made to ensure
confidentiality, users should be aware that data (including e-mail) might, due
to software or hardware failure, become accessible to those who are not
explicitly authorized for that access. No guarantee of complete privacy is made
or implied by this policy. The University reserves the right to review and/or
monitor any transmissions sent or received through the UW-Whitewater Network.
Access may occur in the following circumstances:
Policy Acknowledgement
Any individual or entity that has been
provided access to the UW-Whitewater network, email, or equipment, or has
access to protected UW-Whitewater resources data must:
Access to UW System and UW-Whitewater data and
information technology resources may be withheld until the Acceptable Use
Policies have been accepted.