Information Technology Policies

UW-Madison has IT policies governing use of the campus network and other IT resources. Responsible Use, Electronic Devices and Password Standards are the three policies most likely to affect your day-to-day work. Please review these and other policies before using the network.

NetID and Password

Your NetID is your key to accessing dozens of important online campus resources, including My UW-Madison, WiscMail and many department applications. You should use a strong password in conjunction with your NetID, and change it regularly.

Safe Computing Best Practices

As a UW employee, you are expected to do your part to keep our campus computing environment secure. The following best practices are a good place to start. If you access UW resources from a home computer, you will need to implement these steps yourself. If you are part of a department with its own IT resources, an IT administrator may manage some of these tasks for you, so you should check with that person before making changes to your work or home computers.

Computing Best Practices

  1. Install the free Symantec AntiVirus Software, which includes spyware protection, and use it regularly to scan files.
  2. Keep your operating system patches up to date.
  3. Make sure your firewall is enabled.
  4. Choose strong passwords and keep them private.
  5. Don’t open email or attachments from unknown sources.
  6. Never give out personal information or account numbers (e.g., SSNs) in response to unsolicited email “phishing” requests. Check with your administrator or the DoIT Help Desk before logging into any accounts in response to an unsolicited email, no matter how real it looks.
  7. Adjust your WiscMail spam filters to ward off unwanted email spam.
  8. Back up your important data on separate media (e.g., Bucky Backup, MyWebSpace, external hard drive, flash drive, etc.).
  9. Use Virtual Private Network (VPN) software to connect to the campus network from any location, especially whenever logging into personal accounts or transmitting sensitive data.
  10. Log out of applications fully, especially on public machines (i.e., campus kiosks), and disconnect from the Internet when it’s not in use.