Topics Map > UWGB Help Desk > Accounts
Acceptable Use Policy (Campus Guests)
This document discusses the Acceptable Use Policy for Campus Guests
University of Wisconsin-Green Bay
Campus Guest Acceptable Use Policy for Technology and the Internet
Approved: Technology Council 12/01/2015
Chancellor's Cabinet 03/03/2016
The University of Wisconsin-Green Bay is committed to providing broad access to information technology resources (i.e., computers, software, e-mail accounts, internet access, and similar computing tools) for university students, faculty and staff for use in fulfilling the university’s mission, and for appropriate university-related activities. Visitors to the university may use wired and wireless network connectivity, guest workstations, and kiosks located throughout the campus as long as they follow UWGB acceptable use policies.
While respecting a visitor’s right to privacy during use of campus information technology resources, the university reserves the right to monitor suspicious network activities. Examples of inappropriate and unacceptable use of computing and networking resources include, but are not limited to:
- Any activity that is illegal under federal, State or local laws.
- Installing software on any University owned equipment.
- Using the university network or computer resources for commercial purposes or personal gain.
- Downloading data from the Internet exceeding 1.5 megabits/second of network bandwidth utilization and/or more than two gigabytes of data per day.
- Circumventing network bandwidth restrictions by altering the network address of a campus computer or by switching to another campus computer.
- Connecting personally owned computers into wired network data jacks not designated for this purpose. Data jacks specifically designated for personal use are located across campus and are labeled “DATA JACK AVAILABLE FOR STUDENT USE”.
- Connecting a personally owned computer to any wireless network other than the designated “UWGB Guest” network while on-campus.
- Using the university e-mail system to relay personal e-mails.
- Misrepresenting oneself as another user.
- Attempting to circumvent security software or other security measures placed on university network systems or computers.
- Mishandling, damaging or tampering with computer equipment, software or settings.
- Maliciously accessing, altering, deleting, damaging or destroying any computer system, network, program or data. This includes, but is not limited to, changing or deleting another user’s account, changing the password of another user, using an unauthorized account, damaging or deleting university files, and altering the university network system.
- Disrupting or attempting to disrupt network traffic or attempting to overload or crash the university network and attached systems.
- Attempting to monitor or capture university network traffic.
- Engaging in spam activities (i.e., sending unsolicited electronic communications to large groups of individuals at the same time) or sending e-mail chain letters.
Inappropriate or unacceptable use of university information technology resources may result in disabled access, denial of future access and banning from UW-Green Bay facilities.
NOTE: Security of the university’s information technology resources is not guaranteed. Virus, security and privacy protection are the responsibility of the guest user.