Appropriate Use of UW IT Resources:
Access to electronic mail, the Internet, databases, computers and other information technology (IT) resources is essential to the mission of the UW-Madison (to create, integrate, transfer and apply knowledge), and the achievement of excellence requires their effective use by all faculty, staff and students.
Use of information technology must be consistent with the University's mission and with its role as a public agency. Each member of the University community is expected to protect the integrity of these resources and to know and adhere to University rules, regulations and guidelines for their appropriate use. Regulations that govern personal conduct and use of University facilities (see note below) also apply to the use of IT resources. In addition, the following guidelines apply more specifically to use of IT resources:
- General Guidelines: Access to University IT resources is a privilege granted to members of the University community which carries with it the responsibility to use them for University related activities, exercising common sense and civility.
- Individual Responsibility: Authorization for use of IT facilities is provided to each individual for his or her own use. No person may use an authorization which belongs to someone else. In many cases the University has obtained access to these resources exclusively for the use of members of the University community.
- Security: The protection of University IT resources depends heavily on each user's careful handling of "keys" to these resources, since any account can serve as an entry point for theft, damage or unauthorized use. Users must protect the confidentiality of their personal identification codes and passwords and are expected to exercise reasonable care to insure that others cannot use their accounts.
- "Hacking": Persons may not obtain or use-or attempt to obtain or use-passwords, IP addresses or other network codes that have not been assigned to them as individuals or authorized for their use as University employees. Persons may not obtain-or attempt to obtain-unauthorized access to computer accounts, software, files, or any other University IT resources.
- Malicious Activity: Persons may not alter or intentionally damage software or data belonging to someone else or interfere with another person's authorized access to IT resources. Users may not intentionally disrupt or damage University computers or networks in any way.
- Impersonation and Anonymity: Users of University IT resources may not send electronic messages with the sender's identity forged or send anonymous messages unless the recipient has agreed to receive anonymous messages.
- Commercial, Political and Non-University Activities: Persons may not use University IT resources to sell or solicit sales for any goods, services or contributions unless such use conforms to UW-Madison rules and regulations governing the use of University resources. University employees may not use these resources to support the nomination of any person for political office or to influence a vote in any election or referendum. No one may use University IT resources to represent the interests of any non-University group or organization unless authorized by an appropriate University department.
- De Minimus Usage: In the interest of making the use of IT resources a natural part of the day-to-day learning and work of all members of the University community, incidental personal use is tolerated. However, one should use non-University sources of e-mail, Internet access, and other IT services for activities of an extensive nature that are not related to University purposes.
- State and Federal Laws: Persons may not use University computing facilities to violate State or federal laws.
Note: As published in the University of Wisconsin System Administrative Code and UW-Madison policies. For example, disruption of University activities, damage to facilities, physical threat, theft or harassment as described in UWS 17 and 18; student academic misconduct as described in UWS 14; selling, peddling and soliciting as described in UWS 18; and ethical standards for use of facilities by faculty and staff in UWS 8.
Violation of University rules governing appropriate use of IT resources may result in loss of access privileges, University disciplinary action, and/or criminal prosecution.