Unauthorized Use
Acceptable Use Policy
Access to computer systems and networks owned or operated by the State of Wisconsin, Department of Financial Institutions (the Department) is granted subject to this policy and local, state, and federal laws.
The objective of this policy is to ensure an available, reliable, secure, and responsive network environment for Department systems.
Authorized users have a responsibility to promptly report the theft, security breach, or unauthorized disclosure of information related to the access or use of Department systems or data.
Any activity that compromises the performance of the Department’s systems is not acceptable.
Unauthorized and unacceptable use of the system is prohibited and violators may be subject to criminal and civil penalties. All Department computer systems may be monitored and information examined, recorded, copied and used by the Department for authorized purposes. There is no presumption of privacy when using this computer system.
Examples of unacceptable use include but are not limited to:
- Using the Department systems to encourage any illegal, fraudulent, abusive, or other activities that materially interfere with the business or activities of the Department or the public.
- Attempting to bypass or break any security mechanism on any of the Department systems or using the Department systems in any other manner that poses a material security or service risk to the Department or the public.
- Allowing any other organization or individual to use the granted user ID and password for accessing any Department system in any way.
- Using another organization or individual’s user ID and password to access any Department system in any way.
- Reverse-engineering the Department systems in order to find limitations, vulnerabilities, or evade filtering capabilities.
- Launching or facilitating, whether intentionally or unintentionally, a denial of service attack on any of the Department systems or any other conduct that materially and adversely impacts the availability, reliability, or stability of the Department systems.
- Transmitting any material that contains viruses, Trojan horses, spyware, worms or any other malicious, harmful, or deleterious programs.
- Using the Department systems to harvest or otherwise collect information about individuals, including email addresses or phone numbers, without their explicit consent or under false pretenses.
- Using the Department systems in connection with fraudulent activity.
- Accessing data, a server or an account for any purpose other than conducting authorized business.
- Violating or facilitating the violation of any local, state, federal, or foreign law or regulation, including, but not limited to, laws and regulations regarding the transmission of data or software communications.
Use of DFI Databases
The DFI databases are intended for use by the general public.
Due to limitations of equipment and bandwidth, they are not intended to be a source for bulk downloads of
DFI data. Individuals, companies, IP addresses, or blocks of IP addresses who, in effect, deny service to the general public
by generating unusually high numbers of daily database accesses (searches, pages, or hits),
whether generated manually or in an automated fashion, may be denied access to these servers without notice.
Denial of Service Activities
All WDFI.ORG web assets are intended for use by the general public.
Any activity or operation, whether generated automatically or manually, that results in denial of service for
other customers may be denied access to WDFI.ORG web resources without notice.