UNIVERSITY OF WISCONSIN River Falls
UW-River Falls Administrative Policy
Acceptable Use Policy
Access to computer systems and networks owned or operated by the University of Wisconsin-River Falls imposes certain responsibilities and obligations and is granted subject to university policies, and local, state, and federal statutes.
Access and use of the university's computing facilities, services and resources is granted solely to affiliated university faculty, staff, emeriti or honored, students, alumni, and individuals outside of the university (recognized guests, conference attendees, contractors, or other authorized individuals by Technology Services). The university reserves the right to limit, restrict, or extend computing privileges and access to its resources.
Computers and network resources can provide access to resources both on and off campus. Such open access is a privilege, and requires that individual users act in a responsible and acceptable manner. Acceptable use always is ethical, reflects academic honesty, and shows restraint in the consumption of shared resources. Acceptable use demonstrates respect for intellectual property, truth in communication, ownership of data, system security mechanisms, and individuals' right to privacy and freedom of intimidation, harassment, and unwarranted annoyance. The university considers any violation of these acceptable use principles or guidelines to be a serious offense and Technology Services is charged with investigating; testing, logging and monitoring the use of University systems; seizing university property to copy and examine any files, objects or information resident on university systems allegedly related to unacceptable use.
Those who do not abide by the policies and guidelines listed herein may be subject to immediate suspension and/or permanent loss of computer and network privileges, disciplinary action in accordance with applicable student handbook policies and/or employee misconduct policies, and related administrative or civil processes. Violators may also be subject to criminal prosecution under federal or state laws, and should expect the university to pursue such action.
Please notify University Police or the Division of Technology Services immediately if you become aware of a violation of this policy, the unauthorized use of the university’s computer system and/or network, or a breach or risk to the security provisions that protect the computer systems, the network and user information. All users are expected to cooperate with the Division of Technology Services in their use, access to and operation of the university’s computer systems and networks as well as in the investigation of misuse, abuse or violation of this policy.
The UW-River Falls’ computers, networks, and other information resources (i.e., web pages, email/calendar systems and other information servers) may not be used in any manner prohibited by law or disallowed by licenses, contracts, or university regulations. All authorized users, including students, student organizations or groups, faculty, academic staff, employees, contractors and individuals are accountable for the information they share or publish through the use of the university’s computing resources. All users are responsible for being aware and informed of university policies regarding authorized and appropriate use of the computer systems and networks, confidential information, discrimination or harassment and intellectual property.
All authorized users of the university’s computer system and network are hereby required to:
All users are prohibited from using the university’s computer system, equipment and network in the following manner or for the following activities:
The UW-River Falls Chancellor issues this policy in accordance with the Administrative Policy process.
The Division of Technology Services is responsible for the administration of this policy. Technology Services reserves the right to update this policy at any time, without notice to those who have previously agreed to it, to address newly adopted security practices and threats, users accepting this policy may find the most recent approved copy of this policy on the University’s Administrative Policy website. It is the responsibility of all affiliated users of the University network to review this policy no less than annually.
You may request exceptions to this policy through the Division of Technology Services (DoTS) web site (http://www.uwrf.edu/dots/) by submitting a standard service request prior to proceeding. Or, if you prefer to have a confidential consult with the Chief Information Officer, contact the CIO at their private telephone line 715/425-3701.
To be able to enforce this policy, Technology Services will routinely and from time to time, without notice, monitor, scan, capture, share, log and analyze network traffic on and through the campus LAN and WAN, as well as monitor, share, capture, log and terminate network device usage, as necessary to conduct routine network administrative tasks, respond to escalating threats, comply with Human Resource and Students Rights and University Police investigations, conduct security or copyright investigations, or respond to officially sanctioned requests for information.
Misuse of computing, networking, information, telecommunication, or Internet resources may result in the temporary or permanent loss of access to and use university computer system privileges and network. Additionally, misuse can be prosecuted under applicable statutes. Offenses that are in violation of local, state, or federal laws may be reported to the appropriate university and law enforcement authorities. Users will also be held accountable for their conduct under any applicable university or campus policies or procedures. Complaints alleging misuse of computer resources will be directed to those responsible for taking appropriate disciplinary action. Reproduction or distribution of copyrighted works, in violation of fair use, including, but not limited to, music, videos, images, text, or software, without permission of the owner is an infringement of U.S. Copyright Law and is subject to civil damages and criminal penalties including fines and imprisonment. Violators will be subject to university rules and regulations.
Please direct questions about this policy to email@example.com.