UW-Madison - IT - Top Policies for all faculty, staff, students, and visitors

These top IT policies apply to all faculty, staff, students, and visitors at UW-Madison. In addition, depending on what data or other IT resources a person is using, there are other IT policies that may apply.

Contents

  1. UW System - Acceptable Use of Information Technology Resources

    Applies if you access or use any UW-Madison or UW System Information Technology resources.

  2. IT Compliance Agreement

    Applies if you have a UW-Madison NetID, Guest NetID, or other UW-Madison credentials.

  3. IT Credentials Policy and Password Standard

    The IT Credentials Policy and Password Standard apply if you connect a computer or device of any kind via:

    • any UW-Madison wired network, (for example, connecting a network cable to a wall jack);
    • any UW-Madison public or private wireless network, (for example, connecting to UWNet);
    • any UW-Madison VPN service, (for example, using WiscVPN).
  4. Endpoint Management and Security

    Same as IT Credentials Policy and Password Standard. The Electronic Devices policy applies if you connect a computer or device of any kind via:

    • any UW-Madison wired network, (for example, connecting a network cable to a wall jack);
    • any UW-Madison public or private wireless network, (for example, connecting to UWNet);
    • any UW-Madison VPN service, (for example, using WiscVPN).
  5. Copyright Infringement

    Applies if you download or upload copyrighted material while using UW-Madison Information Technology resources.


1. UW System - Acceptable Use of Information Technology Resources

Applies if you access or use any UW-Madison or UW System Information Technology resources.

Please see UW System - Acceptable Use of Information Technology Resources (on wisconsin.edu)


2. IT Compliance Agreement

Applies if you have a UW-Madison NetID, Guest NetID, or other UW-Madison credentials.

Visit https://kb.wisc.edu/itpolicy/58834 to view the IT Compliance Agreement


3. IT Credentials Policy

Applies if you connect a computer or device of any kind via:

  • any UW-Madison wired network, (for example, connecting a network cable to a wall jack);
  • any UW-Madison public or private wireless network, (for example, connecting to UWNet);
  • any UW-Madison VPN service, (for example, using WiscVPN).

Visit https://policy.wisc.edu/library/UW-528 to view the IT Credentials Policy


Password Standard

Visit https://kb.wisc.edu/itpolicy/58605 to view the Password Standard


4. Endpoint Management and Security

Applies if you connect a computer or device of any kind via:

  • any UW-Madison wired network, (for example, connecting a network cable to a wall jack);
  • any UW-Madison public or private wireless network, (for example, connecting to UWNet);
  • any UW-Madison VPN service, (for example, using WiscVPN).

Policy

Background

Authority

Issued by the UW-Madison Vice Provost for Information Technology.

Enforcement

The University reserves the right to suspend access to preserve the integrity of the network.

Contact

Please address questions or comments to itpolicy@cio.wisc.edu.

References

[Doc 58630 content is unavailable at this time.]

5. Copyright Infringement

Applies if you download or upload copyrighted material while using UW-Madison Information Technology resources.

UW-Madison supports the rights of intellectual property owners as defined by law. This includes all forms of intellectual property regardless of how it is obtained or shared.

Illegal downloading and sharing using “peer-to-peer” file sharing software has been a chronic problem all over the world. Copyright owners of music, movies and other works are increasingly vigilant in protecting their property rights.

The UW System - Acceptable Use of Information Technology prohibits illegal use. This includes downloading, distribution, or other activities that violate copyright law.

When notified of alleged copyright infringement, the university investigates, provides information, and takes corrective action as required by law.

Below are links to some resources to assist in understanding UW-Madison policies and procedures on copyright infringement, peer-to-peer file sharing, and copyright law.

UW System Acceptable Use Of Information Technology Resources

Possible penalties for violating copyright law

UW-Madison procedures for responding to alleged copyright violations

Some legal sources of music and other copyrighted material

UW-Madison Copyright Infringement Compliance Plan (PDF)



Keywords:
agreement guidelines index policy principles recommendations requirements standard statement agreements guideline policies principle recommendation requirement requirements standards statements, administrators alumni applicants community faculty guests it-security-staff it-staff managers students supervisors visitors administration information-technology security, cloud-services copyright identity-management intellectual-property mobile-devices network personally-owned-devices records-management resource-management security cloud cybersecurity devices identity intellectual mobile networking personal personally property records resource telecommunications, access archive business-use collection disposal monitoring retention storage transmission distribution, access-control configuration-and-maintenance education-and-training access configuration education maintenance awareness training seta hipaa-data ferpa-data hipaa ferpa procedures definition procedure parents copyright intellectual-property intellectual property copyrighted-data copyright top cio
Doc ID:
58217
Owned by:
Heather J. in IT Policy
Created:
2015-11-13
Updated:
2024-12-20
Sites:
IT Policy