Network Guest Access
Scope
The scope of this policy covers the security of University electronic information and the infrastructure upon which this information is processed, transmitted or stored and the access of these resources over the University network by guests of the University.
Foundation / Philosophy Statement
The University may need to grant network and information system access to guests for legitimate reasons. In such cases, proper management of this guest access should be used in order to maintain the security of University systems and information.
Statement of Policy
As a convenience to University guests and others having legitimate, professional affiliations with the University, UW-Whitewater allows approved individuals to receive guest access to UW-Whitewater information systems and receive guest Net-ID accounts. Guest Net-ID accounts serve the purpose of allowing approved individuals access to certain University network resources for a limited period of time. Net-ID guest access will be limited to individuals who need information systems access in support of instruction, research, or administration.
Guests are subject to the same policies and procedures governing access to information technology resources as other UW-Whitewater faculty, staff, and students. To be granted guest access, an individual must be sponsored by a faculty or administrative employee of UW-Whitewater and must read, agree to, and abide by the UW-Whitewater Network Usage Policy.
Requestors are responsible for ensuring that guests know the laws and procedures governing access to information technology resources at UW-Whitewater.
ITS Responsibilities
ITS is responsible for managing guest network access to University systems and data. ITS develops policies, procedures and guidelines which manage guest network access to University systems and data.
Operational Procedures
Operational Procedures define our department's services, expectations, and role as part of the campus community.
- Asset Classification
- Campus Computer Repurposing & Surplus Process
- Chargeback for Technology Support
- Computing Environment Support Policy
- Desktop Support Service Guidelines
- Desktop Operating Systems Support
- Data Custodianship
- Data Handling After a Campus Official's Departure
- Employee Checkout/Off-Boarding
- Guest Access
- Information Outsourcing
- Ingeniux & Google Analytics
- Listserv Policy
- Securing Office Computer Equipment
- Port Activation
- Surveillance Camera Use
- Technology Purchasing & Acquisition
- Web DNS Policy & Naming Guidelines