- Many of the computer systems and network equipment operated by DoIT maintain logs that provide information about the use of those systems. These logs are kept for varying lengths of time*. The logs generally contain identification and summary information (source and destination IP numbers, Web URLs, email addresses, telephone numbers, traffic or use amounts, service type, time stamps, etc.) about use rather than the contents of files or communications.
- DoIT staff use log data for the purposes of finding hardware and software errors, tracking resource utilization, capacity planning, and security, including the investigation of inappropriate use of university resources.
- The Office of Cybersecurity will access these logs only upon the receipt of an official complaint of inappropriate use as defined by the UW System Acceptable Use of Information Technology Resources Policy (Acceptable Use Policy).
- Requests for usage log information will be released to other parties by the Office of Cybersecurity only if the request meets the requirements of an existing state statute, federal law, or University of Wisconsin policy (see examples below), as interpreted by the UW–Madison Office of Legal Affairs. Any questions arising from the application of these statutes and policies by the Office of Cybersecurity will be directed to the Office of Legal Affairs.
- Family Educational Right to Privacy Act (FERPA)
- Access to Faculty and Staff Electronic Files Policy
- Wisconsin Open Records Law
- Subpoena. Information consistent with the received subpoena request can be released when a valid subpoena is received by the Office of Legal Affairs.
- A person who wishes to seek access to log data based on the above statutes, laws, or policies may request the Office of Cybersecurity to preserve data beyond its normal retention period*.
* In order to learn the retention time for specific DoIT services, please contact the DoIT Help Desk at 608-264-HELP. In turn, the DoIT Help Desk will pass on your query to the appropriate DoIT staff.