Responsible Use of Computing Resources
Approved December 16, 2005
Technology, which includes but is not limited to personal computers, PDAs, wireless devices and University-owned computers, has become a necessary component of the campus community. Technology is available to University members provided they use the resources responsibly. The University provides computing resources including University Internet connections, e-mail accounts, file storage, and computer labs and classrooms, to support its missions of instruction, research and fostering community. The use of University computing resources must be consistent with these goals. As a responsible member of the University, you are expected to act in accord with the following general policies based on reasonableness applied to the computing environment:
- Respect others' rights to freedom from harassment or intimidation.
Do not send abusive, offensive or patently unwanted material to others. Do not cause the work of others to be disrupted by your actions.
- Respect copyright and other intellectual property rights.
Copying files or passwords belonging to others or to the University may constitute plagiarism, copyright infringement, or theft. Software licensed by the University or used on University owned equipment must be used in accordance with the applicable license agreement.
- Identify yourself appropriately and accurately in electronic
Concealing or misrepresenting your name or affiliation to mask irresponsible or offensive behavior is a serious abuse. Using identifiers of other individuals as your own without permission is prohibited.
- Abide by security restrictions.
Distributing your password or the passwords of others to evade, disable or "crack" password and other security provisions is prohibited. Information residing on institutionally-maintained systems is made available to users on an individual basis only to the extent the department responsible for that data authorizes. This information includes, but is not limited to, student, financial and personnel records.
- Use resources efficiently.
Accept limitations or restrictions on computing resources, such as storage space, printing, time limits and amount of resources consumed. Such restrictions are designed to ensure fair access for all users.
- Recognize realistic limitations to the privacy of electronic
Ideally the contents of what you write or otherwise create, store and send electronically will only be seen by those whom you intend or give permission. The security of electronic files on shared systems and networks is breachable by someone determined to do so. Also note that, as part of their responsibilities, technical managers may need to view the contents of files to diagnose or correct problems in shared systems, to protect University resources, or for other appropriate reasons.
- Accept responsibility for your own work by learning appropriate uses of
Keep archives and backup copies of important work. Learn and properly use software features for securing or sharing access to your files on any computers you use. Change passwords frequently and do not share them.
These policies extend to systems both inside and outside the campus which access University resources (for example, electronic mail or remote logins using the University's Internet connections). Service providers outside the University may impose their own terms of service for which you are responsible.
Members of the UW-L community are expected to be familiar with and abide by all campus technology policies to help maintain continued, reliable technology services to the University community.
- Regent Policy on Use of Information Technology Resources (http://www.uwsa.edu/cert/publicat/itpolicy.htm)
- UW-L Technology Policies (http://www.uwlax.edu/its/html/policies.htm)
- Conduct on University Land (http://www.uwlax.edu/StudentLife/conduct.htm)
- Electronic Information Access Policy (http://www.uwlax.edu/murphylibrary/about/epolicy.html)
In cases of irresponsible use, access privileges may be suspended. You are expected to cooperate with investigations either of technical problems or of possible unauthorized or irresponsible use as defined in these policies. Failure to do so may result in, but may not be limited to, suspension of access.
Information Technology Services will investigate and document apparent or alleged violations of these policies. Cases of apparent abuse will be referred to the appropriate University officials for further investigation and possible disciplinary action. Student cases will be referred to the Office of Student Life, in accordance with the University of Wisconsin System Administrative Code. (http://www.uwsa.edu/bor/admrules.htm)
Issues concerning these policies, or allegations of harassment or other irresponsible use of information technology resources, should be brought to the attention of the Office of Student Life (608-785-8062) and to Mohamed Elhindi, Chief Information Officer/Assistant Vice Chancellor for Information Technology (email@example.com).