UW-Whitewater Acceptable Use Policy

Approved: March 27, 2017


The University of Wisconsin (UW)-Whitewater Network (the "Network") incorporates all electronic communication and computing equipment, along with associated peripherals and infrastructure at locations both on the UW-Whitewater campus, and at off-campus educational and research centers or external service providers. The Network is provided to support the University's mission of education, research, and service as well as to provide support for administrative needs. Any other uses, including uses that jeopardize the integrity of the Network, the privacy or safety of other Users, or that are otherwise illegal are prohibited.

By using or accessing the UW-Whitewater campus network or resources under the control of the UW-Whitewater residing at other locations, you agree to adhere to all local, state and federal laws, and all other applicable University and UW-System policies and guidelines. You are responsible for staying informed about University policies regarding the use of computer and network resources. You are also responsible for complying with all applicable polices. The current UW-Whitewater Network Infrastructure Use Policy, UW-Whitewater Email Policy and other policies dictating access to information resources can be found at http://uww.edu/icit/policies-agreements. The current UW System Information Security Acceptable Use and other policies related to Information Security can be found at https://www.wisconsin.edu/uw-policies/uw-system-administrative-policies/

Appropriate and Reasonable Use Definitions

Appropriate and responsible use of the University of Wisconsin-Whitewater's computing and networking infrastructure, as well as electronic information, is defined as use that is consistent with the teaching, learning, research and administrative objectives of the University. Appropriate use includes: instruction, independent study, research, communications, and official work of UW-Whitewater units, recognized campus organizations, and entities or persons formally associated with the University.

Unacceptable Use

The following activities are NOT acceptable use of the campus network resources:

  • Damaging or performing unauthorized removal of networking equipment, software or data
  • Tampering with network hardware, wiring, or software
  • Disrupting or interfering with the normal operation of network communications, generating excessive network activity, or performing unauthorized monitoring of network traffic
  • Willfully introducing computer viruses or other disruptive programs into the University Network, which are intended to damage or create excessive load on network resources
  • Intentionally violating or attempting to bypass network security strategies
  • Using unauthorized accounts, passwords, IP addresses or other network access information
  • Accessing or modifying any software, files, data or other University information for which an individual has not been given authorization
  • Using network resources to harass or intimidate others
  • Using network resources to impersonate others or to forge another's identity
  • Interfering with the computing activities of others
  • Setting up network services or equipment without knowledge or involvement of the UW-Whitewater Instructional, Communication and Information Technology (ICIT) department
  • Violating state, federal and/or copyright laws
  • Not complying with all licenses and contracts relative to Information Technology Systems which are owned, leased, or subscribed to by UW-Whitewater or the UW System
  • Using network resources for commercial activity or financial gain which does not conform to UW-Whitewater rules and regulations
  • Sharing UW-Whitewater computer account credentials
  • Sharing data with others who are not authorized to access the data, or as defined as not allowed by applicable policies, procedures, or contracts

Network Security Requirements

Information security at UW-Whitewater is a shared responsibility of all users. To maintain security users must adhere to the following guidelines:

  • Protect your login ID and password. The person to whom an account is assigned will be held accountable for any activity originating from that account
  • Do not access data or systems for which you have not been given specific authority
  • Take reasonable steps to ensure that your computer, tablet, or mobile device does not create a security risk when connected to the network; that includes keeping operating systems, antivirus and all other software up-to-date
  • Report any security violations to the University IT department
  • Be aware of all official University communications regarding Network security threats

Access Restrictions

Access to campus network resources may be wholly or partially restricted by the University without prior notice and without the consent of the user when:

  • It is required by and consistent with law
  • There is reason to believe that violations of policy or law have taken place
  • The continued access/use of network resources by an individual significantly affects the integrity, performance, or security of the campus network as a whole
  • When there is reason to believe that a device has been infected or compromised by malicious software that jeopardizes the security of the campus network as a whole

The individual will be notified of the reason and duration of the access restriction as soon as possible. Access will be restored when the situation has been resolved. Penalties for violating University of Wisconsin-Whitewater and UW-System policies may include:

  • Restricted access or loss of access to the Network
  • Disciplinary actions
  • Termination and/or expulsion from the University
  • Civil and/or criminal liability 


While all efforts will be made to ensure confidentiality, users should be aware that data (including e-mail) might, due to software or hardware failure, become accessible to those who are not explicitly authorized for that access. No guarantee of complete privacy is made or implied by this policy. The University reserves the right to review and/or monitor any transmissions sent or received through the UW-Whitewater Network. Access may occur in the following circumstances:

  • In accordance with generally accepted, network administration practices
  • To prevent or investigate any actual or potential information security incidents and/or system misuse, if deemed necessary by authorized personnel
  • To investigate reports of violations of local, state, or federal law, and/or University and/or UW-System policy
  • To comply with legal requests for information (such as subpoenas and public records requests)
  • To retrieve information in emergency circumstances where there is a threat to health, safety, or University property involved
  • To secure information, as deemed necessary due to security concerns, reports of misuse, departure or death of user

Policy Acknowledgement 

Any individual or entity that has been provided access to the UW-Whitewater network, email, or equipment, or has access to protected UW-Whitewater resources data must:

  • Upon hire and annually thereafter, acknowledge and accept the UW System Acceptable Use Policy and any applicable UW-Whitewater Acceptable Use Policies
  • All contractors, consultants and business partners are required to abide by UW System and UW-Whitewater Acceptable Use Policies prior to being given access to university systems and data resources
  • Students with access to only their own data will receive notification at least annually of the UW System and any applicable UW-Whitewater Acceptable Use Policies

Access to UW System and UW-Whitewater data and information technology resources may be withheld until the Acceptable Use Policies have been accepted.

Related Documents 

Scheduled Review 

This document will be reviewed on an annual basis, or as deemed necessary.

Revision/Review Log

Date Approver Action Decription
03/30/2015 Approved.
03/27/2017 Modified Updates to include references and requirements contained in the September 14, 2016 version of the University of Wisconsin System Administrative Information Security Acceptable Use Policy (1034), Awareness Policy (1032) and Awareness Procedure (1032.A) documents.
03/27/2017 Approved. Revised version approved.