Learning Through Research
NCUR 2013 at the University of Wisconsin LaCrosse

Wireless Access

Accessing Wireless Network Using PC (1 page PDF)

Accessing Wireless Network Using Mac (1 page PDF)

 

 

Acceptable Network Usage Policy

The University expects that all persons who make any use of University computing hardware, software, networking services, or any property related or ancillary to the use of these facilities, will abide by the following policy statement:

University information technology resources are provided in the hope that the whole university community will use them in a spirit of mutual cooperation. Resources are limited and must be shared. Everyone will benefit if all computer users avoid any activities which cause problems for others who use the same systems.

All hardware, software, and related services supplied by the University are for the sole purpose of supplementing and reinforcing the University's goals as set forth in the student and faculty handbooks and other mission statements of the University. Misuse of these facilities is a violation of Computer Crimes Statutes and possibly other laws as well. It is a specific violation to give account passwords to individuals who are not the owners of such accounts, or to obtain passwords to or use of accounts other than one's own.

We expect that no one will use hardware, software or services without authorization to do so. Copying software is a violation of federal copyright law. Individuals may not extend their use of the facilities described above for any purpose beyond their intended use, nor beyond those activities sanctioned in University policy statements. In particular, no one may use them

o for personal profit or gain,

o to harass, threaten, or otherwise invade the privacy of others,

o to initiate or forward e-mail chain letters,

o to cause breaches of computer, network or telecommunications security systems,

o to initiate activities which unduly consume computing or network resources.

Individuals who violate the aims of this policy will be subject to disciplinary action or to referral to law enforcement authorities. Information Technology Services personnel are authorized to monitor suspected violations and to examine items stored on any University storage medium by individuals suspected of violating this policy.

By clicking "Accept" you signify that you have read and will abide by the terms of the University Acceptable Network Usage Policy.

You must accept this policy to use the network.