UW-Madison - IT - Top Policies for all faculty, staff, students, and visitors
Contents
UW System - Acceptable Use of Information Technology Resources
Applies if you access or use any UW-Madison or UW System Information Technology resources.
-
Applies if you have a UW-Madison NetID, Guest NetID, or other UW-Madison credentials.
-
IT Credentials Policy and Password Standard
The IT Credentials Policy and Password Standard apply if you connect a computer or device of any kind via:
- any UW-Madison wired network, (for example, connecting a network cable to a wall jack);
- any UW-Madison public or private wireless network, (for example, connecting to UWNet);
- any UW-Madison VPN service, (for example, using WiscVPN).
-
Endpoint Management and Security
Same as IT Credentials Policy and Password Standard. The Electronic Devices policy applies if you connect a computer or device of any kind via:
- any UW-Madison wired network, (for example, connecting a network cable to a wall jack);
- any UW-Madison public or private wireless network, (for example, connecting to UWNet);
- any UW-Madison VPN service, (for example, using WiscVPN).
-
Applies if you download or upload copyrighted material while using UW-Madison Information Technology resources.
1. UW System - Acceptable Use of Information Technology Resources
Applies if you access or use any UW-Madison or UW System Information Technology resources.
Please see UW System - Acceptable Use of Information Technology Resources (on wisconsin.edu)
2. IT Compliance Agreement
Applies if you have a UW-Madison NetID, Guest NetID, or other UW-Madison credentials.
Visit https://kb.wisc.edu/itpolicy/58834 to view the IT Compliance Agreement
3. IT Credentials Policy
Applies if you connect a computer or device of any kind via:
- any UW-Madison wired network, (for example, connecting a network cable to a wall jack);
- any UW-Madison public or private wireless network, (for example, connecting to UWNet);
- any UW-Madison VPN service, (for example, using WiscVPN).
Visit https://policy.wisc.edu/library/UW-528 to view the IT Credentials Policy
Password Standard
Visit https://kb.wisc.edu/itpolicy/58605 to view the Password Standard
4. Endpoint Management and Security
Applies if you connect a computer or device of any kind via:
- any UW-Madison wired network, (for example, connecting a network cable to a wall jack);
- any UW-Madison public or private wireless network, (for example, connecting to UWNet);
- any UW-Madison VPN service, (for example, using WiscVPN).
Policy
Background
Authority
Issued by the UW-Madison Vice Provost for Information Technology.
Enforcement
The University reserves the right to suspend access to preserve the integrity of the network.Contact
Please address questions or comments to itpolicy@cio.wisc.edu.
References
[Doc 58630 content is unavailable at this time.]5. Copyright Infringement
Applies if you download or upload copyrighted material while using UW-Madison Information Technology resources.
UW-Madison supports the rights of intellectual property owners as defined by law. This includes all forms of intellectual property regardless of how it is obtained or shared.
Illegal downloading and sharing using “peer-to-peer” file sharing software has been a chronic problem all over the world. Copyright owners of music, movies and other works are increasingly vigilant in protecting their property rights.
The UW System - Acceptable Use of Information Technology prohibits illegal use. This includes downloading, distribution, or other activities that violate copyright law.
When notified of alleged copyright infringement, the university investigates, provides information, and takes corrective action as required by law.
Below are links to some resources to assist in understanding UW-Madison policies and procedures on copyright infringement, peer-to-peer file sharing, and copyright law.
UW System Acceptable Use Of Information Technology Resources
Possible penalties for violating copyright law
UW-Madison procedures for responding to alleged copyright violations