Math Computer Policies
Here are the Official Math Computer Policies
Computer Account Policy
The following Resolution was proposed and approved by the Mathematics Department on September 23, 1993 and revised on July, 1998 and August, 2005.
1. The computing facilities are for the use of members of the department, specifically, for Math Department faculty (including emeriti and visitors), staff, and current graduate students.
2. Accounts of people no longer members of the department (in the sense of 1.) will be removed after a suitable grace period to allow them time transfer their files to their new accounts. The timetable for removal is given by the following guidelines (3,4,5):
3. Normally, accounts of people who leave will be deleted on August 31 following the time of their departure. Former members who need extra time to relocate may request a temporary (1 or 2 month extension) of their accounts.
4. Students who earned their PhDs during the past academic year and Van Vleck Professors whose appointments have ended may request a 1 year extension of their accounts if they do not have any other academic connection.
5. In special circumstances, someone not a member of the department may be given temporary access to the departmental computing facilities, for the purpose of facilitating joint work with a faculty member of the department. A department member may also request a temporary web site for a math-related function such as a conference. These web sites should have a clear end date. The department member involved should contact the Computer System Oversight Committee explaining the particular need, and will bear full responsibility for that account. Such accounts and web sites will be reviewed periodically and terminated with warning when they are no longer active.
6. In individual cases where the application of 3,4,5 is unclear, the Computer System Oversight Committee will decide when to remove an account.
Web Services and Scripting Policies
Policy on Web Servers, Web Services
In order to ensure the security and integrity of the Van Vleck computer network, all web servers in Van Vleck will be managed by the Math Department's computer staff. They will set up and maintain them to make sure that they meet University security and privacy standards.
These web servers and the services they offer must serve legitimate Math Department functions (for example, instruction, research support and outreach) and must comply with University policies for appropriate use and FERPA policies for privacy.
Forms, if needed, are best accomplished via Google Forms. 
If the web application requires specialized scripts please confer with the computer staff first.
You are welcome to bring your laptop in to the Department in order to do Mathematical work. However, if you connect it to the network via either the Wireless network or a cable, you are responsible for
- Making sure that it is virus and spyware free. University members can pick up a free CD with virus protection software from DoIT or download it here
- The Math Department's computer staff is primarily responsible for installing, maintaining and upgrading the computers in Van Vleck with belong to the Department. They may help you set up your computer initially or troubleshoot hardware and software problems, but only if they have extra time. DoIT provides computer repair services for a fee.
University Computer Policies
The University of Wisconsin has it's own policies for
The Math Department users must also follow these guidelines.
University Computer Policies
The IT staff will occasionally scan for sensitive data on our servers, and may contact users on how to best dispose of sensitive data on their network shares. Sensitive data includes a class of personal identifying information, but in our case is mostly Social Security Numbers.
It is best to NEVER store a Social Security Number on your electronic media. If one is found on your system, you'll be asked on how you'd prefer to dispose of it; either by deletion or by transferring to an encrypted service such as box.com. Dropbox is not encrypted and not an appropriate storage mechanism for sensitive data.
If you have questions on what is sensitive data, how we identify sensitive data or anything thing else related to IT security, please ask the IT Staff (email@example.com)