  {"id":1013,"date":"2018-12-04T08:59:31","date_gmt":"2018-12-04T14:59:31","guid":{"rendered":"https:\/\/uwm.edu\/information-technology\/?page_id=1013"},"modified":"2025-08-11T09:41:32","modified_gmt":"2025-08-11T14:41:32","slug":"policies","status":"publish","type":"page","link":"https:\/\/uwm.edu\/information-technology\/policies\/","title":{"rendered":"IT Policies"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-uwm-it-policies\">51ÁÔÆæ IT Policies<\/h2>\n\n\n\n<p>51ÁÔÆæ maintains policies regarding the use and security of its computer systems, networks and information resources.<\/p>\n\n\n\n<p>All 51ÁÔÆæ users are required to adhere to these policies (faculty, staff, students, and visitors). These policies protect the University&#8217;s computer systems, networks, data and other information resources:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Acceptable Use<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.wisconsin.edu\/regents\/policies\/acceptable-use-of-information-technology-resources\/\">Regent Policy: Acceptable Use of Information Technology Resources<\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Information Security<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">51ÁÔÆæ<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/uwm-shared-account-service-account-guidelines\/\">51ÁÔÆæ Shared Account &amp; Service Account Guidelines<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/uwm-system-security-guidelines\/\">51ÁÔÆæ System Security Guidelines<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/uwm-data-classification-guidelines\/\">51ÁÔÆæ Data Classification Guidelines<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/information-security-practice-sensitivity-labels\/\">Information Security Practice: Sensitivity Labels<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/\">51ÁÔÆæ Practice for Vendor-associated Data Breach Notification<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/information-security-practice-protecting-the-privacy-of-users\/\">Information Security Practice: Protecting the Privacy of Users<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Universities of Wisconsin<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/information-security-authentication\/\">Information Security: Identity and Access Management Standard<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/information-security-data-classification-and-protection\/\">Information Security: Data Classification<\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Procurement<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">51ÁÔÆæ<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/it-procurement\/\">51ÁÔÆæ IT Procurement Practice<\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Technology Standards<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">51ÁÔÆæ<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/university-videoconference-technology-standards\/\">Information Technology Practice: 51ÁÔÆæ Videoconference Technology Standards<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/standard-for-uw-milwaukee-apple-macintosh-computers\/\">Standard for UW-Milwaukee Apple Macintosh Computers<\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Privacy<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">51ÁÔÆæ<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/uwm.edu\/full-privacy-statement\/\">51ÁÔÆæ Privacy Statement<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/web-privacy-statement\/\">Web Privacy Statement<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>51ÁÔÆæ IT Policies 51ÁÔÆæ maintains policies regarding the use and security of its computer systems, networks and information resources. All 51ÁÔÆæ users are required to adhere to these policies (faculty, staff, students, and visitors). These policies protect the University&#8217;s computer &hellip;<\/p>\n","protected":false},"author":200,"featured_media":0,"parent":0,"menu_order":45,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","uwm_wg_additional_authors":[]},"class_list":["post-1013","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Technology Resources<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/information-technology\/policies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Policies\" \/>\n<meta property=\"og:description\" content=\"51ÁÔÆæ IT Policies 51ÁÔÆæ maintains policies regarding the use and security of its computer systems, networks and information resources. All 51ÁÔÆæ users are required to adhere to these policies (faculty, staff, students, and visitors). These policies protect the University&#8217;s computer &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/information-technology\/policies\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology Resources\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-11T14:41:32+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@51ÁÔÆæ_IT\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/\",\"name\":\"IT Policies - Technology Resources\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\"},\"datePublished\":\"2018-12-04T14:59:31+00:00\",\"dateModified\":\"2025-08-11T14:41:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Policies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\",\"name\":\"Technology Resources\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Technology Resources","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/information-technology\/policies\/","og_locale":"en_US","og_type":"article","og_title":"IT Policies","og_description":"51ÁÔÆæ IT Policies 51ÁÔÆæ maintains policies regarding the use and security of its computer systems, networks and information resources. All 51ÁÔÆæ users are required to adhere to these policies (faculty, staff, students, and visitors). These policies protect the University&#8217;s computer &hellip;","og_url":"https:\/\/uwm.edu\/information-technology\/policies\/","og_site_name":"Technology Resources","article_modified_time":"2025-08-11T14:41:32+00:00","twitter_card":"summary_large_image","twitter_site":"@51ÁÔÆæ_IT","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/information-technology\/policies\/","url":"https:\/\/uwm.edu\/information-technology\/policies\/","name":"IT Policies - Technology Resources","isPartOf":{"@id":"https:\/\/uwm.edu\/information-technology\/#website"},"datePublished":"2018-12-04T14:59:31+00:00","dateModified":"2025-08-11T14:41:32+00:00","breadcrumb":{"@id":"https:\/\/uwm.edu\/information-technology\/policies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/information-technology\/policies\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/information-technology\/policies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/information-technology\/"},{"@type":"ListItem","position":2,"name":"IT Policies"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/information-technology\/#website","url":"https:\/\/uwm.edu\/information-technology\/","name":"Technology Resources","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/information-technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"publishpress_future_action":{"enabled":false,"date":"2026-04-24 10:02:09","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/1013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/users\/200"}],"replies":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=1013"}],"version-history":[{"count":45,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/1013\/revisions"}],"predecessor-version":[{"id":15274,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/1013\/revisions\/15274"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=1013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}