Activate Waisman Account

This page is obsolete. Do not proceed unless instructed to by Waisman IT

Step 1 of 3 - Policies

This form will activate your newly established Waisman Computing Network Services Account. Until your account is activated you will not be able to use any Waisman network services. You only need to activate your account once.

Below, you will be asked to view both UW-Madison and Waisman appropriate use policies and guidelines that pertain to using information technology (IT) resources. Please read these carefully. If you agree to abide by them, you will be taken to the final step of the activation process.

The UW-Madison Information Technology Committee (ITC) and the Provost's Office have approved guidelines for appropriate use of campus information technology resources. The policy includes eleven guidelines in areas like computer security, hacking,impersonation and anonymity.

The appropriate use policy has been incorporated into the student non-academic misconduct rules for UW-Madison. According to the Dean of Students office, violation of the code by students may result in disciplinary action including probation, suspension, and expulsion. Violation of the policy by faculty and staff may result in loss of access privileges, University disciplinary action, and/or criminal prosecution.

While the Office of Campus Information Security (OCIS) does not monitor people's use of the network, the web or e-mail, complaints will be investigated.

An official copy of the Responsible Use Policy can be found on-line at:

It is included below for your convenience:

A second UW-Madison Policy adopted in March 2004 pertains to network security and anything attached to the campus network. It's known as the "Policy on Electronic Devices" and can be viewed at:

It states:

Devices connected to the University of Wisconsin-Madison network by any means must:

In cases where it is not possible to update software or firmware, the device must be protected by other means, such as, but not limited to, a dedicated firewall or limited network access.

The University reserves the right to suspend access to preserve the integrity of the network.

In addition to the University Responsible Use Guidelines you must also agree to Responsible use guidelines established for using Waisman Center computing facilities. The following guidelines augment but do not revoke any uses granted above by the University Responsible Use Guidelines:

1. Legitimate Use
To use Waisman computing resources, facilities and services only to conduct Waisman related business and research that is consistent with the mission of the Waisman Center.

2. Copyrighted Material
Not violate copyrights, licenses or other content restrictions, whether you believe they are valid or not, by storing protected material on Waisman provided storage services or equipment. This includes music, images, movies, licensed software or any other protected material.

3. Security
Adhere to established security policies, HIPAA (where applicable) and best practices in order to mitigate the risk of damage and/or disruption to Waisman services, research, business activities or funding as a result of litigation.

4. Periodic Auditing
Use of computing and network resources will be periodically audited to ensure that the above policies are adhered to.

Do you agree to abide by these guidelines and policies?

Last updated May 25, 2004 by
Document source: /activate_account.html