  {"id":14307,"date":"2025-03-28T13:27:54","date_gmt":"2025-03-28T18:27:54","guid":{"rendered":"https:\/\/uwm.edu\/information-technology\/policies\/information-security-practice-protecting-the-privacy-of-users\/"},"modified":"2025-08-14T11:58:27","modified_gmt":"2025-08-14T16:58:27","slug":"information-security-practice-protecting-the-privacy-of-users","status":"publish","type":"page","link":"https:\/\/uwm.edu\/information-technology\/policies\/information-security-practice-protecting-the-privacy-of-users\/","title":{"rendered":"Information Security Practice: Protecting the Privacy of Users"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-summary\">Summary<\/h2>\n\n\n\n<p>51ÁÔÆæ\u2019s IT professionals shall take reasonable measures to protect the privacy of accounts assigned to 51ÁÔÆæ\u2019s authorized users. Though absolute privacy of 51ÁÔÆæ\u2019s authorized users cannot be guaranteed, as a general practice, the contents of user accounts shall be treated as private and not examined or disclosed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-implementation-details\">Implementation Details<\/h2>\n\n\n\n<p>The fundamental purpose of information security tools and practices is to protect the university\u2019s IT resources and accounts, mindful of the need to protect the \u201cprivacy interests\u201d of authorized users. Those 51ÁÔÆæ staff members in UITS and CTS with the technical ability to access others\u2019 51ÁÔÆæ accounts shall:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sign confidentiality agreements<\/li>\n\n\n\n<li>Not access user accounts unless authorized to do so for a \u201clegitimate business purpose\u201d<\/li>\n\n\n\n<li>Take reasonable measures to protect the privacy of accounts assigned to 51ÁÔÆæ\u2019s authorized users<\/li>\n\n\n\n<li>As a general practice, treat the contents of user accounts as private and not examine or disclose them<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-policy-references\">Policy References<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Regent Policy Document 25-3: \u201cAcceptable Use of Information Technology Resources\u201d <a href=\"https:\/\/www.wisconsin.edu\/regents\/policies\/acceptable-use-of-information-technology-resources\/\">https:\/\/www.wisconsin.edu\/regents\/policies\/acceptable-use-of-information-technology-resources\/<\/a>\n<ul class=\"wp-block-list\">\n<li>\u201cThe UW System shall take reasonable measures to protect the privacy of its IT resources and accounts assigned to authorized users. However, the UW System cannot guarantee absolute security and privacy.\u201d<\/li>\n\n\n\n<li>\u201cGenerally, the contents of user accounts will be treated as private and not examined or disclosed\u201d<\/li>\n\n\n\n<li>\u201cUW institutions will work with authorized users to protect their privacy interests\u201d<\/li>\n\n\n\n<li>\u201cAuthorized users must not violate the privacy of other users. Technical ability to access unauthorized resources or others\u2019 accounts does not by itself imply authorization to do so, and it is a violation of this policy to access others\u2019 accounts unless authorized to do so for a legitimate business purpose\u201d<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-please-note\"><strong>Please Note<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u201c<strong>Policies<\/strong>\u201d are formal, authoritatively-determined Mandates from UW System and the Board of Regents\n<ul class=\"wp-block-list\">\n<li>Regent Policies \u2013 Section 25 \u201cInformation Systems and Technology\u201d\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.wisconsin.edu\/regents\/policies\/\">https:\/\/www.wisconsin.edu\/regents\/policies\/<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>UW System Administrative Policies &amp; Procedures &#8211; 1000 Series \u201cInformation Security\u201d<br>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/\">https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>\u201c<strong>Practices<\/strong>\u201d are campus-specific, CIO-approved 51ÁÔÆæ implementations by UITS and CTS of \u201cPolicies\u201d<\/li>\n\n\n\n<li>\u201c<strong>Guidelines<\/strong>\u201d are published guidance for Policy implementation by 51ÁÔÆæ employees not typically serving in UITS and CTS and who might not be technologists per se \u2013 e.g., the campus data stewards<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary 51ÁÔÆæ\u2019s IT professionals shall take reasonable measures to protect the privacy of accounts assigned to 51ÁÔÆæ\u2019s authorized users. Though absolute privacy of 51ÁÔÆæ\u2019s authorized users cannot be guaranteed, as a general practice, the contents of user accounts shall be &hellip;<\/p>\n","protected":false},"author":1652,"featured_media":0,"parent":1013,"menu_order":10,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","uwm_wg_additional_authors":[]},"class_list":["post-14307","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Technology Resources<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/information-technology\/policies\/information-security-practice-protecting-the-privacy-of-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Practice: Protecting the Privacy of Users\" \/>\n<meta property=\"og:description\" content=\"Summary 51ÁÔÆæ\u2019s IT professionals shall take reasonable measures to protect the privacy of accounts assigned to 51ÁÔÆæ\u2019s authorized users. Though absolute privacy of 51ÁÔÆæ\u2019s authorized users cannot be guaranteed, as a general practice, the contents of user accounts shall be &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/information-technology\/policies\/information-security-practice-protecting-the-privacy-of-users\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology Resources\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-14T16:58:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@51ÁÔÆæ_IT\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/information-security-practice-protecting-the-privacy-of-users\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/information-security-practice-protecting-the-privacy-of-users\\\/\",\"name\":\"Information Security Practice: Protecting the Privacy of Users - Technology Resources\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\"},\"datePublished\":\"2025-03-28T18:27:54+00:00\",\"dateModified\":\"2025-08-14T16:58:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/information-security-practice-protecting-the-privacy-of-users\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/information-security-practice-protecting-the-privacy-of-users\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/information-security-practice-protecting-the-privacy-of-users\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Policies\",\"item\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/policies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security Practice: Protecting the Privacy of Users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\",\"name\":\"Technology Resources\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Technology Resources","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/information-technology\/policies\/information-security-practice-protecting-the-privacy-of-users\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Practice: Protecting the Privacy of Users","og_description":"Summary 51ÁÔÆæ\u2019s IT professionals shall take reasonable measures to protect the privacy of accounts assigned to 51ÁÔÆæ\u2019s authorized users. Though absolute privacy of 51ÁÔÆæ\u2019s authorized users cannot be guaranteed, as a general practice, the contents of user accounts shall be &hellip;","og_url":"https:\/\/uwm.edu\/information-technology\/policies\/information-security-practice-protecting-the-privacy-of-users\/","og_site_name":"Technology Resources","article_modified_time":"2025-08-14T16:58:27+00:00","twitter_card":"summary_large_image","twitter_site":"@51ÁÔÆæ_IT","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/information-technology\/policies\/information-security-practice-protecting-the-privacy-of-users\/","url":"https:\/\/uwm.edu\/information-technology\/policies\/information-security-practice-protecting-the-privacy-of-users\/","name":"Information Security Practice: Protecting the Privacy of Users - Technology Resources","isPartOf":{"@id":"https:\/\/uwm.edu\/information-technology\/#website"},"datePublished":"2025-03-28T18:27:54+00:00","dateModified":"2025-08-14T16:58:27+00:00","breadcrumb":{"@id":"https:\/\/uwm.edu\/information-technology\/policies\/information-security-practice-protecting-the-privacy-of-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/information-technology\/policies\/information-security-practice-protecting-the-privacy-of-users\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/information-technology\/policies\/information-security-practice-protecting-the-privacy-of-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/information-technology\/"},{"@type":"ListItem","position":2,"name":"IT Policies","item":"https:\/\/uwm.edu\/information-technology\/policies\/"},{"@type":"ListItem","position":3,"name":"Information Security Practice: Protecting the Privacy of Users"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/information-technology\/#website","url":"https:\/\/uwm.edu\/information-technology\/","name":"Technology Resources","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/information-technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"publishpress_future_action":{"enabled":false,"date":"2026-04-24 12:17:12","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/14307","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/users\/1652"}],"replies":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=14307"}],"version-history":[{"count":5,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/14307\/revisions"}],"predecessor-version":[{"id":15344,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/14307\/revisions\/15344"}],"up":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/pages\/1013"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=14307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}