This document discusses the Staff Acceptable Use Policy for Technology & the Internet
Approved: UW-Green Bay Technology Council (4/15/02)
Chancellor's Cabinet (4/23/02)
Version 2005.4 (4/26/05)
The University of Wisconsin-Green Bay furnishes computers and provides access to campus network resources, including the Internet, in order to support learning, promote educational excellence and prepare students for an increasingly technological world. Much of the responsibility for appropriate use of information technology and the Internet rests with the employees. Therefore, UW-Green Bay requires that employees act responsibly by reading and following the policies outlined below. This document incorporates UW System Policy number 97-2 and UW-Green Bay guidelines for the appropriate use of information technology by employees. This document applies to all permanent and temporary employees, including student employees. For policies related to the activities of students in their academic role please see University of Wisconsin-Green Bay Student Acceptable Use Policy for Technology and the Internet. Student Acceptable Use Policy for Technology
UWS POLICY ON USE OF UNIVERSITY INFORMATION TECHNOLOGY RESOURCES 97-2 History: Res. 7461 adopted 6/6/97.
In accordance with its mission to disseminate and extend knowledge, to foster the free exchange of ideas, and to provide effective support for its teaching, research and public service functions, it is the policy of the University of Wisconsin System to afford broad access to information technology resources for university students, faculty and staff for use in fulfilling the university’s missions, and for appropriate university-related activities.
Access to information technology resources carries with it the responsibility for ensuring that the use of these resources is primarily for university purposes and university-related activities, and for maintaining the integrity and security of the university’s computing facilities. In the interest of making the use of information technology resources a natural part of the day-to-day work of all members of the university community, incidental personal use is tolerated. However, one should use non-university sources of e-mail, internet access and other information technology services for activities of an extensive or recurring nature that are not related to university purposes. For the security of the information technology system, individuals having access to information technology resources must take reasonable care to ensure that unauthorized persons are not able to use their access to the system.
Information technology resources are a dynamic mechanism for the free exchange of knowledge, and it is desirable for the university to foster the robust dialogue that results from the use of the resource, and to encourage students, faculty and staff to participate in that dialogue. Those exchanges that reflect the ideas, comments and opinions of individual members of the university community must, however, be distinguished from those that represent the official positions, programs and activities of the university. Students, faculty and staff using information technology resources for purposes of exchanging, publishing or circulating official university documents must follow institutional requirements concerning appropriate content and style.
The university is not responsible for the content of documents, exchanges or messages, including links to other information locations on the internet or world wide web, that reflect only the personal ideas, comments and opinions of individual members of the university community, even where they are published or otherwise circulated to the public at large by means of university information technology resources.
During times when they are away from the UW institution where they are enrolled, students may benefit from the ability to use the information technology resources of another UW campus. To the extent possible with available resources, each UW System institution should allow access to its information technology resources by students taking distance education and other courses from other UW System institutions.
The university’s information technology resources are, by nature, finite. All members of the university community must recognize that certain uses of university information technology resources may be limited for reasons related to the capacity or security of the university’s information technology systems, or as required for fulfilling the university’s primary teaching, research and public service missions.
No information technology resources can absolutely guarantee the privacy or confidentiality of electronic documents. UW institutions should, however, take reasonable precautions to protect electronic documents containing private and confidential information, and to assure persons using university information technology resources to transmit e-mail or electronic documents that the university will not seek access to their messages or documents except where necessary to:
UW System institutions may choose to establish more detailed procedures for determining when access to electronic documents will be sought by the institution. As encryption products become more readily available, institutions may also wish to make them available to information technology users as appropriate to protect privacy interests.
In addition to the general principles set forth in this policy, the use of information technology resources may be affected by a number of other legal and ethical principles. While it is not possible to list all potentially applicable laws and regulations, the following are particularly likely to have implications for the use of university information technology resources:
1. Ethical standards of conduct for the appropriate use of one’s university position and university resources are established for faculty and academic staff in Chapter UWS 8, Wisconsin Administrative Code, and for classified staff in Chapter ER-MRS 24, Wisconsin Administrative Code.
2. Chapters UWS 14 and 17, Wisconsin Administrative Code, establish standards and disciplinary processes relating to academic and nonacademic misconduct by students, including prohibitions on disruption of university activities, damage to university facilities, harassment and similar matters.
3. Chapter UWS 18, Wisconsin Administrative Code, governs conduct on university lands, and applies to all members of the university community. Chapter UWS 21, Wisconsin Administrative Code, regulates the use of university facilities.
4. Section 943.70, Wisconsin Statutes, defines and prohibits certain computer crimes.
5. Chapter 11, Wisconsin Statutes, restricts the use of state facilities for political activities by state employees.
6. The federal copyright law applies to materials published or circulated through the use of computing resources.
7. The federal Family Educational Rights and Privacy Act restricts access to personally identifiable information from students’ education records.
Students, faculty and staff are responsible for understanding and observing these and all other applicable policies, regulations and laws in connection with their use of the university’s information technology resources.
UW System Institution Responsibilities
In order to assist members of the university community in fulfilling their responsibilities with respect to use of information technology resources, each UW institution shall disseminate this policy, together with guidance as to any specific campus policies affecting the use of information technology resources.
Failure to Comply with Information Technology Resource Policies
Failure to adhere to the provisions of this policy may result in the suspension or loss of access to university information technology resources, appropriate disciplinary action as provided under existing procedures applicable to students, faculty and staff, or civil or criminal prosecution.
To preserve and protect the integrity of information technology resources, there may be circumstances where the university must immediately suspend or deny access to the resources. Should a student’s access be suspended under these circumstances, the university shall inform the student immediately and shall afford the student an opportunity to respond. The university shall then determine whether disciplinary action under Chapter UWS 17, Wisconsin Administrative Code, or some alternative course of action, is warranted and shall follow the procedures established for such cases.
These policies apply to all employees. This includes any remote access which employees may gain from off-site, but which involves the use of UW-Green Bay sites, servers, intranet facilities, e-mail accounts or software.
All permanent employees will receive a computer account, which includes file storage on the central servers and email services. All temporary employees hired for more than 30 days will receive a computer account, which includes file storage on the central servers and email services. Employees with computer accounts will be provided training on accessing their accounts and some time during their work shift to access a computer to check email and other job related applications.
The technical aspects of electronic communications and storage require that files and transmissions be backed up, logged and occasionally analyzed. When such activities are done as part of the normal business of maintaining an efficient computing and networking environment, employees will maintain strict confidentiality of the information. Beyond system administration requirements or as required by law, the university shall only permit inspection, monitoring or disclosure of e-mail or electronic documents without consent from the account owner after consultation with the Chancellor, Provost, Vice Chancellor, or their designees. The University will respond to lawfully issued subpoenas and public records requests. In addition to responding to legal requests, users should be aware that data might, due to software or hardware failure, become accessible to those who are not explicitly authorized for that access. Therefore, users should exercise extreme caution in using e-mail to communicate confidential or sensitive matters. No guarantee of complete privacy is made or implied by this policy.External access will be provided to authorized users by the assignment of unique login identification code “usernames” and passwords. Authorized users will be personally responsible for maintaining the integrity of UW-Green Bay’s access policy, and may not permit other persons to use their usernames, passwords, accounts or disk space, or disclose their usernames, passwords or account information to any third party. Users must respect the integrity and security of UW-Green Bay’s computer systems and network, and the access privileges, privacy and reasonable preferences of other users. UW-Green Bay reserves the right to limit resource allocations in order to optimize an equitable allocation of resources among users.
Employees who violate this Acceptable Use Policy may have their access privileges suspended or revoked by the network administrator. In addition, further disciplinary action may be taken as permitted by applicable law, university code, and/or the terms of any applicable collective bargaining agreement. Apparent or alleged violations to the policy will be brought to the attention of the appropriate institutional officer, or her/his designee.
The following procedures will be used by the Information Services Division for potential violations of the campus Acceptable Use Policy for Technology and the Internet.
NOTE: All suspected or apparent violations within the Business and Finance operational areas will be brought to the attention of the Vice Chancellor for Business & Finance prior to investigation.
* appropriate line administrator = Chancellor, Athletics Director, Assistant Vice Chancellor for Advancement, Assistant Vice Chancellor for Planning and Budget, Vice Chancellor for Business and Finance, Provost, Deans of Liberal Arts and Professional Programs, Associate Provosts for Student Affairs and Information Services, and Director of Outreach and Adult Education.
Except as otherwise indicated below, all policies and prohibitions regarding users of the network also apply to users of individual UW-Green Bay computers.
Violation of the policies described herein for use of computing resources will be dealt with seriously. Violators are subject to disciplinary procedures of the University, may lose computing privileges or account and network access, and may also be subject to prosecution by state and federal authorities under laws including, but not limited to: the Privacy and Protection Act of 1974; Wisconsin Statutes (Chapter 19, Public Records and Property, ss. 19.31-19.39; Chapter 939, Crimes- General Provisions, ss. 939.32.(2), 939.50(3), 939.51(3), 939.66(4), 939.72(3); Chapter 943, Crimes Against Property, ss.943.70); The Wisconsin Computer Crimes Act; the 1986 Electronic Communications Privacy Act; the Computer Fraud and Abuse Act of 1989. The sanction and appeal process will vary, depending upon the classification of the offender within the University community.
Information technology resources include computers, software, e-mail accounts, internet access and similar computing tools.
“University” is used in this document to refer to the University of Wisconsin System and its institutions.
Official university documents are those which purport to speak for the university and its official programs and departments, such as policy documents, official forms, curriculum information, institutional statistics, and departmental home pages on the world wide web.
The electronic records of university employees are subject to disclosure in accordance with the Wisconsin Public Records Law. Student records, including electronic documents, are protected against disclosure by the Family and Educational Rights and Privacy Act, which restricts access to personally identifiable information from students’ education records.