UW System - Acceptable Use of Information Technology Resources
Applies if you access or use any UW-Madison or UW System Information Technology resources.
Applies if you have a UW-Madison NetID, Guest NetID, or other UW-Madison credentials.
Password Policy and Password Standard
The Password Policy and Standard apply if you connect a computer or device of any kind via:
Electronic Devices Connected to the Network
Same as Password Policy and Standard. The Electronic Devices policy applies if you connect a computer or device of any kind via:
Applies if you download or upload copyrighted material while using UW-Madison Information Technology resources.
Applies if you access or use any UW-Madison or UW System Information Technology resources.
Please see UW System - Acceptable Use of Information Technology Resources (on wisconsin.edu)
Applies if you have a UW-Madison NetID, Guest NetID, or other UW-Madison credentials.
Visit https://kb.wisc.edu/itpolicy/58834 to view the IT Compliance Agreement
Applies if you connect a computer or device of any kind via:
Visit https://policy.wisc.edu/library/UW-514 to view the Password Policy
Visit https://kb.wisc.edu/itpolicy/58605 to view the Password Standard
Applies if you connect a computer or device of any kind via:
Issued by the UW-Madison Vice Provost for Information Technology.
Please address questions or comments to itpolicy@cio.wisc.edu.
Applies if you download or upload copyrighted material while using UW-Madison Information Technology resources.
UW-Madison supports the rights of intellectual property owners as defined by law. This includes all forms of intellectual property regardless of how it is obtained or shared.
Illegal downloading and sharing using “peer-to-peer” file sharing software has been a chronic problem all over the world. Copyright owners of music, movies and other works are increasingly vigilant in protecting their property rights.
The UW System - Acceptable Use of Information Technology prohibits illegal use. This includes downloading, distribution, or other activities that violate copyright law.
When notified of alleged copyright infringement, the university investigates, provides information, and takes corrective action as required by law.
Below are links to some resources to assist in understanding UW-Madison policies and procedures on copyright infringement, peer-to-peer file sharing, and copyright law.
UW System Acceptable Use Of Information Technology Resources
Possible penalties for violating copyright law
UW-Madison procedures for responding to alleged copyright violations
Keywords | agreement guidelines index policy principles recommendations requirements standard statement agreements guideline policies principle recommendation requirement requirements standards statements, administrators alumni applicants community faculty guests it-security-staff it-staff managers students supervisors visitors administration information-technology security, cloud-services copyright identity-management intellectual-property mobile-devices network personally-owned-devices records-management resource-management security cloud cybersecurity devices identity intellectual mobile networking personal personally property records resource telecommunications, access archive business-use collection disposal monitoring retention storage transmission distribution, access-control configuration-and-maintenance education-and-training access configuration education maintenance awareness training seta hipaa-data ferpa-data hipaa ferpa procedures definition procedure parents copyright intellectual-property intellectual property copyrighted-data copyright top cio | Doc ID | 58217 |
---|---|---|---|
Owner | Tim B. | Group | IT Policy |
Created | 2015-11-13 15:43 CST | Updated | 2022-08-31 15:05 CST |
Sites | IT Policy | ||
CleanURL | https://kb.wisc.edu/itpolicy/cio-top-policies | ||
Feedback | 0 0 Comment Suggest a new document |