1.0Technology Resources/information-technologyjamesek2@uwm.edu/information-technology/author/jamesek2uwm-edu/IT Policiesrich600338<blockquote class="wp-embedded-content" data-secret="L7TMSOCnXF"><a href="/information-technology/policies/">IT Policies</a></blockquote><iframe sandbox="allow-scripts" security="restricted" src="/information-technology/policies/embed/#?secret=L7TMSOCnXF" width="600" height="338" title="“IT Policies” — Technology Resources" data-secret="L7TMSOCnXF" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"></iframe><script type="text/javascript"> /* <![CDATA[ */ /*! This file is auto-generated */ !function(d,l){"use strict";l.querySelector&&d.addEventListener&&"undefined"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i<o.length;i++)o[i].style.display="none";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute("style"),"height"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):"link"===t.message&&(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document); //# sourceURL=/information-technology/wp-includes/js/wp-embed.min.js /* ]]> */ </script> 51ÁÔÆæ IT Policies 51ÁÔÆæ maintains policies regarding the use and security of its computer systems, networks and information resources. All 51ÁÔÆæ users are required to adhere to these policies (faculty, staff, students, and visitors). These policies protect the University’s computer …