  {"id":644,"date":"2022-07-25T15:44:55","date_gmt":"2022-07-27T17:06:47","guid":{"rendered":"https:\/\/uwm.edu\/graduate-assistants\/handbook\/research-assistants\/information-and-data-security\/"},"modified":"2022-08-02T13:14:29","modified_gmt":"2022-08-02T18:14:29","slug":"information-and-data-security","status":"publish","type":"handbook","link":"https:\/\/uwm.edu\/graduate-assistants\/handbook\/research-assistants\/information-and-data-security\/","title":{"rendered":"Information and Data Security"},"content":{"rendered":"\n<p class=\"default\">All members of the 51ÁÔÆæ community are required to complete annual information security training, but the responsibilities of many Research Assistants are much greater. Research Assistants should understand a wider range of information and data security policies at 51ÁÔÆæ and how the data generated from research may be susceptible. In addition, Research Assistants are often responsible for maintaining more sensitive data, such as the private information of individuals in a research study, patentable research results, or information relevant to national security.<\/p>\n\n\n\n<p class=\"default\">Research Assistants should always use university-provided email and lab-related storage (rather than personal OneDrive space) for all research-related activities. This ensures that basic campus-level data security processes are in place and ensures continued access to their work by the PI following the conclusion of their Research Assistant\u2019s position.<\/p>\n\n\n\n<p class=\"default\">Research Assistants also must learn to identify and describe the principles of information security and recognize common threats to information security. They also must use appropriate strategies to minimize information security risks in relation to research data, which may vary considerably depending on the nature of the research project. Supervisors may institute other data security requirements, such as restrictions on the use of email, rules related to the use of email attachments, or guidance on the appropriate use of USB flash drives. Research Assistants must be scrupulous in their observance of all data security rules. When in doubt about information security practices, Research Assistants should consult their supervisors.<\/p>\n\n\n\n<p class=\"default\">For policies and training on information and data security, please see 51ÁÔÆæ\u2019s <a href=\"https:\/\/uwm.edu\/itsecurity\/\">Information Security<\/a> website.<\/p>\n","protected":false},"author":37709,"parent":383,"menu_order":11,"template":"","class_list":["post-644","handbook","type-handbook","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Information and Data Security - Graduate Assistant Handbook<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/graduate-assistants\/handbook\/research-assistants\/information-and-data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information and Data Security\" \/>\n<meta property=\"og:description\" content=\"All members of the 51ÁÔÆæ community are required to complete annual information security training, but the responsibilities of many Research Assistants are much greater. Research Assistants should understand a wider range of information and data security policies at 51ÁÔÆæ and &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/graduate-assistants\/handbook\/research-assistants\/information-and-data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Graduate Assistant Handbook\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-02T18:14:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/handbook\\\/research-assistants\\\/information-and-data-security\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/handbook\\\/research-assistants\\\/information-and-data-security\\\/\",\"name\":\"Information and Data Security - Graduate Assistant Handbook\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/#website\"},\"datePublished\":\"2022-07-27T17:06:47+00:00\",\"dateModified\":\"2022-08-02T18:14:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/handbook\\\/research-assistants\\\/information-and-data-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/handbook\\\/research-assistants\\\/information-and-data-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/handbook\\\/research-assistants\\\/information-and-data-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Handbook\",\"item\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/handbook\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Research Assistants\",\"item\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/handbook\\\/research-assistants\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Information and Data Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/\",\"name\":\"Graduate Assistant Handbook\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/#organization\",\"name\":\"University of Wisconsin - Milwaukee\",\"url\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/wp-content\\\/uploads\\\/sites\\\/606\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/wp-content\\\/uploads\\\/sites\\\/606\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"width\":225,\"height\":224,\"caption\":\"University of Wisconsin - Milwaukee\"},\"image\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/graduate-assistants\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information and Data Security - Graduate Assistant Handbook","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/graduate-assistants\/handbook\/research-assistants\/information-and-data-security\/","og_locale":"en_US","og_type":"article","og_title":"Information and Data Security","og_description":"All members of the 51ÁÔÆæ community are required to complete annual information security training, but the responsibilities of many Research Assistants are much greater. Research Assistants should understand a wider range of information and data security policies at 51ÁÔÆæ and &hellip;","og_url":"https:\/\/uwm.edu\/graduate-assistants\/handbook\/research-assistants\/information-and-data-security\/","og_site_name":"Graduate Assistant Handbook","article_modified_time":"2022-08-02T18:14:29+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/graduate-assistants\/handbook\/research-assistants\/information-and-data-security\/","url":"https:\/\/uwm.edu\/graduate-assistants\/handbook\/research-assistants\/information-and-data-security\/","name":"Information and Data Security - Graduate Assistant Handbook","isPartOf":{"@id":"https:\/\/uwm.edu\/graduate-assistants\/#website"},"datePublished":"2022-07-27T17:06:47+00:00","dateModified":"2022-08-02T18:14:29+00:00","breadcrumb":{"@id":"https:\/\/uwm.edu\/graduate-assistants\/handbook\/research-assistants\/information-and-data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/graduate-assistants\/handbook\/research-assistants\/information-and-data-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/graduate-assistants\/handbook\/research-assistants\/information-and-data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/graduate-assistants\/"},{"@type":"ListItem","position":2,"name":"Handbook","item":"https:\/\/uwm.edu\/graduate-assistants\/handbook\/"},{"@type":"ListItem","position":3,"name":"Research Assistants","item":"https:\/\/uwm.edu\/graduate-assistants\/handbook\/research-assistants\/"},{"@type":"ListItem","position":4,"name":"Information and Data Security"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/graduate-assistants\/#website","url":"https:\/\/uwm.edu\/graduate-assistants\/","name":"Graduate Assistant Handbook","description":"","publisher":{"@id":"https:\/\/uwm.edu\/graduate-assistants\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/graduate-assistants\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uwm.edu\/graduate-assistants\/#organization","name":"University of Wisconsin - Milwaukee","url":"https:\/\/uwm.edu\/graduate-assistants\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uwm.edu\/graduate-assistants\/#\/schema\/logo\/image\/","url":"https:\/\/uwm.edu\/graduate-assistants\/wp-content\/uploads\/sites\/606\/2020\/11\/uwm-seo-logo.jpg","contentUrl":"https:\/\/uwm.edu\/graduate-assistants\/wp-content\/uploads\/sites\/606\/2020\/11\/uwm-seo-logo.jpg","width":225,"height":224,"caption":"University of Wisconsin - Milwaukee"},"image":{"@id":"https:\/\/uwm.edu\/graduate-assistants\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/uwm.edu\/graduate-assistants\/wp-json\/wp\/v2\/handbook\/644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/graduate-assistants\/wp-json\/wp\/v2\/handbook"}],"about":[{"href":"https:\/\/uwm.edu\/graduate-assistants\/wp-json\/wp\/v2\/types\/handbook"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/graduate-assistants\/wp-json\/wp\/v2\/users\/37709"}],"version-history":[{"count":3,"href":"https:\/\/uwm.edu\/graduate-assistants\/wp-json\/wp\/v2\/handbook\/644\/revisions"}],"predecessor-version":[{"id":874,"href":"https:\/\/uwm.edu\/graduate-assistants\/wp-json\/wp\/v2\/handbook\/644\/revisions\/874"}],"up":[{"embeddable":true,"href":"https:\/\/uwm.edu\/graduate-assistants\/wp-json\/wp\/v2\/handbook\/383"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/graduate-assistants\/wp-json\/wp\/v2\/media?parent=644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}