Report of the UW-Madison Ad Hoc Electronic Data Advisory Committee
Policies and Procedures Governing Access to Electronic Files
September 13, 1991 (as revised October 7, 1991, by the Faculty Senate)
Introduction
The Electronic Data Advisory Committee was created by the University Committee to clarify the privacy and confidentiality status of electronic data and to draft procedures for the University to follow in providing access to information in this form.
The faculty and staff of the University should be under no delusions as to the essential confidentiality of their electronic files. Even when one takes elaborate precautions (e.g., file encryption) the nature of modern communication networks is such that true confidentiality is impossible to guarantee. In addition, the Wisconsin open records law may require public disclosure of electronic data. All users of these services should be apprised of these facts.
The Federal Electronic Communications Privacy Act of 1986 (18 U.S.C. sec. 2511) and parallel language adopted by the Wisconsin Legislature (sec. 968.31(2), Wis. Stats.) allows the University to examine electronic information when necessary to protect the rights and property of the University. The proposed procedures provide a mechanism for doing so in a way that respects the rights of individuals involved.
The report that follows deals with the question of appropriate procedures for the University to follow in cases of requests for access to electronic files initiated internally. (Requests for access that originate external to the University will normally arise under circumstances described in Section 6 of these procedures. In such cases, the University will provide notice to the controller and the opportunity to respond, whenever possible.)
In general, all computer and electronic files should be free from access by any but the authorized users of those files. Exceptions to this basic principle shall be kept to a minimum and made only where essential to
- meet the requirements of the state open records law and other statutory or regulatory requirements;
- protect the integrity of the University and the rights and property of the State;
- allow system administrators to perform routine maintenance and respond to emergency situations such as combating "viruses" and the like; and
- protect the rights of individuals working in collaborative situations where information and files are shared.
Accordingly, the Ad Hoc Electronic Data Advisory Committee recommends the following actions:
- The University should make a special and periodic effort to notify users that:
- Faculty Policies and Procedures include rules governing the privacy of electronic data;
- State or federal regulations may supersede these policies and procedures; and
- electronic communications and data files are not secure from unauthorized access;
- Because the proposed policy does not address how departments and schools may access students' instructional accounts, departments and schools should codify their procedures for managing and gaining access to such accounts;
- The Faculty adopt the following policy and procedures to govern access to electronic files controlled by faculty and staff:
Policy and Procedures Governing Access to Electronic Files at the University of Wisconsin-Madison Principles
The procedures are based on three fundamental principles:
- Intrusion into electronic files requires carefully considered cause;
- Controllers of files should be notified before accessing their files; and
- The University has an obligation to protect the integrity of the University, its services, its confidential data, and the rights and property of the State.
Definitions
As used in these procedures:
- "Electronic File" encompasses information stored and/or transmitted in electronic form, including but not limited to text, data, sound, graphics, images, and video, irrespective of its recording and transmission media or its format.
Examples of electronic files include e-mail messages, databases, and magnetic tape files and subsets thereof.
- "Controller of a file" is defined as follows:
- on a single user computer under the control of a single person (e.g., a computer in a faculty office) the files normally are controlled by that person;
- on computers accessed by more than one individual, but which do not have an operating system that identifies files with a specific user, the individual responsible to the University for control of the computer (e.g., the laboratory director or department chair) is considered to be the controller of electronic files resident on that computer;
- On multiuser systems, an individual is typically registered or given an account. The registered user or account holder is normally considered to be the controller of files held in that account;
- In "work for hire" situations where one party enters or edits material for the originator of a file, the one responsible for originating the material in the file is the controller of the file. The person charged with entering the material is usually considered to be an authorized user. For example, when a secretary or a research assistant working under explicit directions uses a computer to enter and edit a document for a faculty member, the faculty member is the controller of the file and the secretary or research assistant is an authorized user.
- "Authorized User" includes the controller of a file and someone who is given explicit access to the file by a controller.
- "System Administrator" is an individual who has been charged by a University unit with maintaining a computer system and its software at an acceptable level of performance for the service that it is expected to provide.
Procedures
- Except as provided for in Sections 5 and 6, no one but an authorized user of an electronic file may intentionally access that file without receiving either
- The permission of the controller of the file; or
- The express written permission of the Vice Chancellor for Academic Affairs, who may grant such permission only in accordance with the procedures established by Sections 2 and 3 below.
- Except as provided for in Sections 5 and 6, the Vice Chancellor for Academic Affairs may grant permission to those persons listed in section 2(b) to access a computer or electronic file only upon determining that the all of the following steps have been taken:
- The Vice Chancellor for Academic Affairs has received in writing a request for access that specifies the reasons for the requested access and lists the requested file(s) by name, contents, or a description that clearly limits access to the file(s) necessary to further the purposes designated in Section 2(f).
- The written request has been made by a dean, director, department chair, vice-chancellor, or other person who has responsibility for protecting the integrity of the University, its services, and the rights and property of the State.
- The Vice Chancellor for Academic Affairs has notified in writing the controller of the file(s) that a request for access to the specified file(s) has been made and is pending. When there is doubt as to who is the controller of a file, notice should be sent to all the known individuals likely to have such an interest.
Notification must, at a minimum,
- specify the name of the party requesting the file(s);
- list by name, description, or contents the file(s) requested;
- indicate that unless waived in writing by the controller of the file(s) within four days of notification, an inquiry as specified in section 2(d) of these procedures will be held to examine whether justification exists for granting the requested access;
- indicate that in the event a section 2(d) committee has been appointed, the controller of the file(s) has a right to make known to the committee his or her views on whether access is justified;
- indicate that the file(s) in question shall not be altered or deleted by anyone, including the controller and that alterations or deletions may be a basis for disciplinary action; and,
- if relevant, indicate that the Vice Chancellor for Academic Affairs has exercised his or her power under section 3 to take the minimum steps necessary to preserve the contents of the subject file(s).
- The Vice Chancellor for Academic Affairs has appointed a committee of three members, all of whom are otherwise uninvolved in the request and at least two of whom are members of the faculty or academic staff (as is appropriate to the case), to inquire into whether a justification under section 2(f) exists to warrant granting the requested access. Unless granted additional time, the committee will conduct its inquiry and make a written report to the Vice Chancellor within ten calendar days of its appointment.
At a minimum, the committee shall
- examine the written request for access provided to the Vice Chancellor under Section 2(a); and
- offer all those notified under Section 2(c) an opportunity to make known to the ad hoc committee their views on whether access is justified.
- The Vice Chancellor for Academic Affairs has received the results of the inquiry specified in Section 2(d) of these procedures or has received the controller's waiver of the section 2(d) inquiry.
- The Vice Chancellor for Academic Affairs finds that the requested access is necessary to protect the integrity of the University, its services, and the rights and property of the State.
- The Vice Chancellor for Academic Affairs has put in writing, with as much specificity as possible, the reasons for granting access to the file(s).
- Upon the written request of one of those persons listed in section 2(b) or on his or her own initiative, the Vice Chancellor for Academic Affairs may authorize the appropriate University unit to take all necessary steps to preserve and save the contents of any file(s) within the University's computer systems. An order to preserve the contents of the file is meant to assure that the data in the file(s) is not destroyed, altered, or lost. Any such order does not constitute permission to open, read, or otherwise use the contents of the file(s). Access to the contents of the file(s) shall be obtained only under procedures specified herein or under conditions stated in Sections 5 and 6.
- All requests for access to electronic files made under the Wisconsin open records law shall be made through the office of the University's Custodian of Records. It is recommended that the office of the Custodian of Records promulgate procedures consistent with the Wisconsin open records law and the principles expressed in these procedures. Such procedures shall provide for notice to the controller before public disclosure, whenever possible.
- Nothing in these procedures is meant
- to supersede the usual procedures followed by departments and schools in monitoring student accounts given for specific course work; or
- to preclude computer system administrators from authorizing the routine maintenance of campus computer or communication systems or the rectification of emergency situations that threaten the integrity of campus computer or communication systems, provided that use of accessed files is limited solely to maintaining or safeguarding the system (which may include safeguarding the system from illegal use) or solving specific problems.
- Nothing in these procedures is meant to either limit or expand access to files pursuant to Wisconsin or United States statutes or regulations, such as those governing patient records, student information files, open records, criminal investigations conducted by federal, state or local law enforcement authorities or certain personnel actions.
The Ad Hoc Electronic Data Advisory Committee:
Seymour Parter, Professor, Computer Sciences and Mathematics (Chair)
David Brown, Senior Policy and Planning Analyst, Office of Information Technology
Dennis Fryback, Professor, Industrial Engineering and Preventive Medicine
Thomas Palay, Professor, Law
Tad Pinkerton, Professor, Computer Sciences & Director, Information Technology
Charlene Rieck, Information Processing Consultant, College of Agricultural & Life Sciences
Text copied from gopher://wiscinfo.wisc.edu:70/00/.browse/.METASOFFP/.data/.00000192. Revised with document "UW-Madison Faculty Document 890a - 7 October 1991" from the records of T. Pinkerton, 25 March 1999.
Effective: Oct 07, 1991
Revised: Mar 25, 1999 RevA
Reviewed: Sep, 2017
Review in: Two years
Maintained by: Office of the CIO, IT Policy
History at: https://kb.wisc.edu/itpolicy/fs-access-to-files-history
Reference at: https://kb.wisc.edu/itpolicy/fs-access-to-files-policy