  {"id":14301,"date":"2025-03-28T13:26:58","date_gmt":"2025-03-28T18:26:58","guid":{"rendered":"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/"},"modified":"2025-08-14T12:03:02","modified_gmt":"2025-08-14T17:03:02","slug":"uwm-practice-for-vendor-associated-data-breach-notification","status":"publish","type":"page","link":"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/","title":{"rendered":"51ÁÔÆæ Practice for Vendor-associated Data Breach Notification"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-summary\">Summary<\/h2>\n\n\n\n<p>If a 51ÁÔÆæ campus unit receives a \u201cdata breach\u201d notification from its IT service vendor, the affected 51ÁÔÆæ campus unit must immediately notify 51ÁÔÆæ\u2019s Chief Information Officer and Chief Information Security Officer. To do so, an email message should be sent to this address: abuse@uwm.edu.<\/p>\n\n\n\n<p>51ÁÔÆæ must comply with UW System policy provisions and formal campus procedures on \u201cincident response.\u201d Moreover, in the event of a verified data breach, 51ÁÔÆæ must adhere to statutorily-required time limits for sending victim notifications.<\/p>\n\n\n\n<p>51ÁÔÆæ campus leaders should regularly share information on this required practice with relevant colleagues in their respective schools, colleges, and divisions.<\/p>\n\n\n\n<p>Authority: Pursuant to Regent Policy Document 25-5 and UW System Presidential Directive, the CIO is currently the Chancellor-appointed \u201cInformation Security Designee\u201d for our campus. As Designee, the CIO has individual responsibility for \u201call the information technology environments\u201d used by 51ÁÔÆæ.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary If a 51ÁÔÆæ campus unit receives a \u201cdata breach\u201d notification from its IT service vendor, the affected 51ÁÔÆæ campus unit must immediately notify 51ÁÔÆæ\u2019s Chief Information Officer and Chief Information Security Officer. To do so, an email message should &hellip;<\/p>\n","protected":false},"author":1652,"featured_media":0,"parent":1013,"menu_order":7,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","uwm_wg_additional_authors":[]},"class_list":["post-14301","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Technology Resources<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"51ÁÔÆæ Practice for Vendor-associated Data Breach Notification\" \/>\n<meta property=\"og:description\" content=\"Summary If a 51ÁÔÆæ campus unit receives a \u201cdata breach\u201d notification from its IT service vendor, the affected 51ÁÔÆæ campus unit must immediately notify 51ÁÔÆæ\u2019s Chief Information Officer and Chief Information Security Officer. To do so, an email message should &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology Resources\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-14T17:03:02+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@51ÁÔÆæ_IT\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/uwm-practice-for-vendor-associated-data-breach-notification\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/uwm-practice-for-vendor-associated-data-breach-notification\\\/\",\"name\":\"51ÁÔÆæ Practice for Vendor-associated Data Breach Notification - Technology Resources\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\"},\"datePublished\":\"2025-03-28T18:26:58+00:00\",\"dateModified\":\"2025-08-14T17:03:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/uwm-practice-for-vendor-associated-data-breach-notification\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/uwm-practice-for-vendor-associated-data-breach-notification\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/uwm-practice-for-vendor-associated-data-breach-notification\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Policies\",\"item\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"51ÁÔÆæ Practice for Vendor-associated Data Breach Notification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\",\"name\":\"Technology Resources\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Technology Resources","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/","og_locale":"en_US","og_type":"article","og_title":"51ÁÔÆæ Practice for Vendor-associated Data Breach Notification","og_description":"Summary If a 51ÁÔÆæ campus unit receives a \u201cdata breach\u201d notification from its IT service vendor, the affected 51ÁÔÆæ campus unit must immediately notify 51ÁÔÆæ\u2019s Chief Information Officer and Chief Information Security Officer. To do so, an email message should &hellip;","og_url":"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/","og_site_name":"Technology Resources","article_modified_time":"2025-08-14T17:03:02+00:00","twitter_card":"summary_large_image","twitter_site":"@51ÁÔÆæ_IT","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/","url":"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/","name":"51ÁÔÆæ Practice for Vendor-associated Data Breach Notification - Technology Resources","isPartOf":{"@id":"https:\/\/uwm.edu\/information-technology\/#website"},"datePublished":"2025-03-28T18:26:58+00:00","dateModified":"2025-08-14T17:03:02+00:00","breadcrumb":{"@id":"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/information-technology\/policies\/uwm-practice-for-vendor-associated-data-breach-notification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/information-technology\/"},{"@type":"ListItem","position":2,"name":"IT Policies","item":"https:\/\/uwm.edu\/information-technology\/policies\/"},{"@type":"ListItem","position":3,"name":"51ÁÔÆæ Practice for Vendor-associated Data Breach Notification"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/information-technology\/#website","url":"https:\/\/uwm.edu\/information-technology\/","name":"Technology Resources","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/information-technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"publishpress_future_action":{"enabled":false,"date":"2026-04-24 09:16:54","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/14301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/users\/1652"}],"replies":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=14301"}],"version-history":[{"count":6,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/14301\/revisions"}],"predecessor-version":[{"id":15348,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/14301\/revisions\/15348"}],"up":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/1013"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=14301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}